<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.jazz.security</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/about</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/cookies-notice</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/rsac-archive</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/events</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/careers</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/contact</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/product/investigation</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/product/posture</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/product/prevention</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/product/detection</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/anatomy-of-a-modern-data-leak-how-ai-connects-the-dots-that-rules-cant-see</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/dlp-is-broken-its-time-to-remaster-it</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/how-to-map-and-fix-your-true-data-risk</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/jazz-comes-out-of-stealth-with-61m-to-remaster-data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/rethinking-dlp-for-the-ai-era---security-that-enables-the-business</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/the-market-spoke-before-we-did</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/why-dlp-never-worked---and-what-we-built-instead</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/blog/why-were-named-jazz</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/event/ai-soc-live</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/event/black-hat-usa-2026</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/event/dlp-sucks-live-episode-1</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/event/gartner-security-risk-management-summit-2026</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/event/jazz-night-1</loc>
    </url>
    <url>
        <loc>https://www.jazz.security/event/jazz-night-vol-2</loc>
    </url>
</urlset>