<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>
            https://www.network-perception.com
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/knowledge-base
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/product
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/solutions/network-visibility-software
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/solutions/nerc-cip-compliance
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/solutions/network-segmentation-software
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/solutions/network-auditing-software
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resources
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/white-papers
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/case-studies
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/product-walkthrough
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/company/partnerships
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/company/press
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/contact-us
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/demo-request
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/search
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/knowledge-base-search
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/terms-of-service
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/legal
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/pci-compliance
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb-archive
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/reporting-as-a-service-raas
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/uofiterms
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/customer-referral-program
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/network-perception-referral-program
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/thank-you
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/gridseccon-2024
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/check-point-demo
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/collecting-evidence-eguide
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/crown-computers
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/cyber-hygiene-what-a-culture-of-compliance-looks-like-why-it-is-important
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/edf-renewables
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/evidence-collection-audit-preparation
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/fortinet-demo
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/how-to-best-combine-human-expertise-and-technology-to-strengthen-ot-cybersecurity
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/nerc-cip-003-9-what-now-response-requirements-part-3
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/nerc-cip-003-part-2
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/network-access-case-study
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/network-audits-case-study
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/np-view-demo
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/paloalto-demo
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/path-analysis-basics
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/pseg
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/the-power-of-np-view
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/topology-map-overview
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/use-np-view-to-prepare-for-a-nerc-cip-005-audit
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/using-np-view-to-prepare-for-a-nerc-cip-003-audit-2
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/resource/what-you-need-to-know-about-new-requirements
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/knowledge-base-categories/feature-documentation
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/knowledge-base-categories/getting-started
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/knowledge-base-categories/product-tutorials
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/knowledge-base-categories/reference
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/knowledge-base-categories/supported-devices-data
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/6-notifications
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/access-rules-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/additional-data
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/architecture-review
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/asset-inventory-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/audit
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/background-tasks
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/change-tracking-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/compare-path-history
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/configuration-np-view-server
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/configuration-sanitizer
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/configure-connectors
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/configuring-np-view
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/connectivity-matrix
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/connectivity-paths-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/connectors
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/continuous-configuration-monitoring
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/data-import
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/export-map
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/firewalls-routers-switches
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/help-center
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/highlight-paths
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/id-risks
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/incident-response
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/incremental-data-availability-across-workspaces-and-views
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/installing-np-view
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/installing-np-view-server
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/interfaces-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/licensing
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/manage-views
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/manage-zones
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/nat-rules-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/network-risk-assessment
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/network-visualization
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/network-visualization---layer-2
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/np-connect
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/object-groups-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/path-analysis
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/policy-manager
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/policy-review
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/reports
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/risks-warnings-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/routes-report
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/rule-usage-analysis-palo-alto-ngfw
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/ruleset-representation
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/security-information-and-event-management-siem-integration
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/shortcut-keys
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/smart-search
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/summary-reports
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/system-logs
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/topology-annotations
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/topology-map
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/tutorials-webinars
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/ubuntu-and-docker-update-packages
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/updating-np-view-server
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/users-groups
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/verified-assets
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/what-we-do
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/workspaces
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/kb/zone-matrix
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/press-release/dragos-acquires-network-perception-delivers-the-industrys-most-comprehensive-visibility-of-ot-environments
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/2022-resolution-cybersecurity-verification
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/3-vs-of-velocity
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/5-best-practices-for-nerc-cip-compliance
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/accelerate-incident-response-with-next-generation-network-access-visualization
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/best-practices-how-to-prepare-for-your-tsa-security-directive
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/bolstering-network-segmentation-with-np-view-a-cyber-hygiene-perspective
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/breaking-down-the-new-tsa-security-pipeline-directive
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/breaking-down-the-revised-tsa-security-pipeline-directive-3
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/build-a-robust-risk-based-compliance-framework
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/building-blocks-to-holistic-network-visibility
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/building-cyber-resiliency-protecting-your-digital-future
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/could-cip-005-have-prevented-the-solarwinds-attack
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/cyber-resilience-np-views-proactive-approach-to-safeguarding-network-infrastructure
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/difference-between-network-traffic-monitoring-and-network-access-modeling
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/electric-sector-is-at-risk
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/elevating-your-cyber-hygiene-with-np-view-mastering-firewall-rule-auditing
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/enhancing-cyber-hygiene-with-np-view-a-deep-dive-into-network-visibility
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/enhancing-grid-security-the-role-of-risk-based-compliance-in-nerc-cip
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/enhancing-nerc-cip-audits-with-np-view
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/evidence-for-upcoming-audit
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/firewall-auditing-in-the-oil-and-gas-industry-ensuring-cybersecurity-resilience
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/firewall-misconfigurations
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/grc-outlook-solidifying-cyber-resiliency
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/how-can-critical-infrastructure-facilities-become-cyber-resilient
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/how-to-achieve-cyber-resilience
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/how-to-become-nerc-compliant
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/introduction-to-nerc-cip-vulnerability-assessment
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/lessons-learned-from-the-solarwinds-compromise
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/mitigating-cybersecurity-risks
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/network-perception-acquisition-strengthens-industrial-cyber-defense-with-network-segmentation-and-access-analysis
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/network-perception-checklist-prepare-for-your-tsa-security-directive-by-october-27-2022
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/network-segmentation
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/preparing-for-cyber-attacks-on-utilities-gas-oil-and-water-2-sides-of-network-visibility
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/preparing-for-escalating-cyber-threats
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/prevent-cyber-attacks-network-segmentation
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/preventing-lateral-movement-through-network-access-visibility
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/revealing-the-most-violated-standards-in-nerc-cip-compliance
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/safeguarding-ot-companies-the-crucial-role-of-firewall-auditing
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/shaping-tomorrow-the-future-of-nerc-cip-compliance
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/sleeping-on-ot-cyber-security
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/steps-to-stay-ahead-of-nerc-cip-005-requirements
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-difference-between-ot-and-it
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-evolution-of-nerc-cip-compliance
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-importance-of-velocity-in-cybersecurity
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-importance-of-verification-in-cybersecurity
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-importance-of-visibility-in-cybersecurity
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-ins-and-outs-of-cyber-hygiene
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-path-to-cyber-resilience-how-np-view-enhances-cyber-hygiene-practices
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/the-road-ahead-reflections-from-sans-ics-2021
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/three-principles-improve-utility-cyber-resiliency
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/top-10-cybersecurity-predictions-and-statistics-for-2023
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/top-2022-cybersecurity-tech-trends
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/top-5-network-access-vulnerabilities-impacting-ot
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/two-prominent-threats-ransomware-and-supply-chain-attacks-have-recently-increased
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/unleashing-the-power-of-network-visualization
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/unlocking-the-benefits-of-a-network-risk-assessment
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/unveiling-common-firewall-audit-findings-and-effective-remediation
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/unveiling-the-unseen-the-importance-of-ot-network-visibility
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/using-np-view-to-prepare-for-a-nerc-cip-005-audit
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/what-does-my-nerc-cip-005-compliance-preparedness-score-mean
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/what-is-a-good-firewall-policy
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/what-is-cyber-resiliency-and-why-is-it-important
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/what-is-firewall-compliance
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/what-mike-tyson-can-teach-us-about-ot-network-security
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/where-was-your-baseline-when-the-colonial-incident-happened
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/why-building-a-cyber-hygiene-environment-matters
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/why-is-a-network-risk-assessment-important
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/why-nerc-cip-is-important-to-our-national-cybersecurity-strategy
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/why-the-democratic-national-convention-puts-chicagos-infrastructure-at-risk-for-cyberattacks
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/blog/why-two-sides-of-network-visibility-matters-more-than-ever
        </loc>
    </url>
    <url>
        <loc>
            https://www.network-perception.com/careers/test-career
        </loc>
    </url>
</urlset>