<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ochronasieci.pl/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ochronasieci.pl/blog/parasol-ochronny-nad-siecia-firmowa/</loc>
		<lastmod>2022-02-28T12:04:03+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/Parasol_Ochronny.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/secondary_logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/info-tile-all-b.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/Wana_Decrypt0r_screenshot-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/1498545401517.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/Intelligent-Proxy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/blog/nie-od-rzeczy-ten-internet/</loc>
		<lastmod>2022-02-28T12:59:36+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/nie-do-rzeczy-ten-internet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/blog/jest-rok-1971/</loc>
		<lastmod>2022-03-01T10:29:29+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/pierwszy_email.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/emails.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/jestRok.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/xdr-rozszerzone-wykrywanie-i-reagowanie/</loc>
		<lastmod>2022-03-11T09:52:13+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/XDR.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/Cyber-attack.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/widocznosc_zagrozen_XDR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/korelacja_zagrozen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/zautomatyzowanie_XDR.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/zautomatyzowanie_XDR.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/cyberspecjalisci-gdzie-sie-wszyscy-podziali/</loc>
		<lastmod>2022-03-14T10:14:39+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/specjalisci_cyberbezpieczenstwa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/blog/cyberwar-w-kontekscie-nie-tylko-ukrainsko-rosyjskim/</loc>
		<lastmod>2022-03-14T10:33:11+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/cyberwar.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/hakerzy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-securex/</loc>
		<lastmod>2022-03-14T14:37:57+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/CiscoSecureX.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/prostota.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/widocznosc.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/zarzadzanie.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-secure-workload-tetration/</loc>
		<lastmod>2022-03-14T14:39:04+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/Cisco-Secure-Workload.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/binary-code.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/shield-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/internet.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/zero-trust-security/</loc>
		<lastmod>2022-03-14T14:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/zerotrust.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/login.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/browser.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/secure-payment.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/locked.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/access.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/ftp-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-anyconnect-secure-mobility-client/</loc>
		<lastmod>2022-03-14T14:43:28+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/Cisco_AnyConnect.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/1606975202786.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/1606975215970.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/1606974949880.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/bezpieczna-praca-zdalna/</loc>
		<lastmod>2022-03-14T14:48:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/pracazdalna.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/1596798027751.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/zabezpieczenie-styku-z-internetem-sase/</loc>
		<lastmod>2022-03-14T14:51:37+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/sase.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/sase_styk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/nac-kontrola-dostepu-do-sieci-korporacyjnej/</loc>
		<lastmod>2022-03-14T14:54:25+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/kontrola_dostepu_do_sieci_firmowej.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/testy-penetracyjne/</loc>
		<lastmod>2022-03-21T15:04:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/testy_penetracyjne-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/testy-osint.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/uslugi-wsparcia-w-zakresie-cyberbezpieczenstwa/</loc>
		<lastmod>2022-03-21T15:04:28+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/usugi-wsparcia-bezpieczenstwa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/wycieki-danych/</loc>
		<lastmod>2022-03-21T15:04:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/wycieki-danych.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/utrata-kontroli-nad-kontem/</loc>
		<lastmod>2022-03-21T15:04:40+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/Utrata-kontroli-nad-kontem.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/testy-podatnosci-vulnerability-assessment/</loc>
		<lastmod>2022-03-25T10:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/testy-podatnosci2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/fazaplanowaniatestow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/firewall/</loc>
		<lastmod>2022-03-28T10:46:33+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/firewall.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/firewalll.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/ochrona-dns/</loc>
		<lastmod>2022-03-28T10:46:54+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/ochrona-dns.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/targettt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/laptop.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/DNS1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/database.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cloud.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/laptop-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/trojan-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-umbrella/</loc>
		<lastmod>2022-03-28T10:47:02+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/Umbrella.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/datasecuritsy.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/Free-Trial-Laptop-New-Product.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/brain-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/eye.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/lock.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/Ochrona-DNS-Umbrella-Cisco.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/Chronimy-DNS-24_7.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/WannaCry-RansomwareDefense_Timeline-1080x699-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/malware/</loc>
		<lastmod>2022-03-28T10:47:09+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/malware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/malware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-next-generation-firewall-ngfw/</loc>
		<lastmod>2022-03-28T10:47:24+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/ngfw.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cngf-blog.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1547614274756.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1546847065911.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1546846985569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1547031945553.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1546847274230.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1547031975159.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/1547031997453.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1547032016552.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1546847599342.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/1546847489537.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1546847545371.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/ransomware/</loc>
		<lastmod>2022-03-28T10:47:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/08/Ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ransom2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ransom3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ransom.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ransom1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ransom4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/spam/</loc>
		<lastmod>2022-03-28T10:47:57+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/08/spam.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/spam02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/sql-injection/</loc>
		<lastmod>2022-03-28T10:48:10+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/08/sq-injection.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/datasecurity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/dos-ddos/</loc>
		<lastmod>2022-03-28T10:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/08/ddos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ddoss.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/man-in-the-middle/</loc>
		<lastmod>2022-03-28T10:48:34+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/08/man-in-the-middle.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/mitm.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/phishing/</loc>
		<lastmod>2022-03-28T10:48:45+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/08/phishing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/phising.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/ngips/</loc>
		<lastmod>2022-03-28T10:48:55+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/09/ng_ips.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cloud-computing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/stats.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/visualization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/scientist-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/weryfikacja-dwuetapowa/</loc>
		<lastmod>2022-03-28T10:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/easy-password.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/cloud-access-security-broker/</loc>
		<lastmod>2022-03-28T12:06:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/Cloud-Access-Security-Broker.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ransom2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cloud01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cloud02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/rozwiazania-dlp/</loc>
		<lastmod>2022-03-28T12:06:45+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/rozwiazania_dlp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/phising.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/dlpix34.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/dlpixo.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/bezpieczenstwo-punktow-koncowych/</loc>
		<lastmod>2022-03-28T12:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/bezpieczenstwo_punktow_koncowych.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/bpk01.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/bpk02.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/bpk03.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/uczenie-maszynowe/</loc>
		<lastmod>2022-03-28T12:07:17+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/machine-learinig-bot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/machinelearinigbot.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/bezpieczenstwo-poczty-e-mail/</loc>
		<lastmod>2022-03-28T12:07:27+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/bezpieczenstwopocztyemail.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/malware-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/email.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/phishing-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/poczazabeziecz.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-ise-identity-services-engine/</loc>
		<lastmod>2022-03-28T12:08:01+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/CISCO-ISE.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ise01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/ise02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/brain.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/placeholder.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/search.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-cloudlock/</loc>
		<lastmod>2022-03-28T12:08:23+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/Cisco-Cloudlock.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/clodk01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/seo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/responsive-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/responsive.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cloud-computing-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/loupe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/security-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-email-security-dla-office-365/</loc>
		<lastmod>2022-03-28T12:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/cisco-email-security-for-365.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/e36501.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/e36502.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/mo36ico01.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/mo36ico02.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/mo36ico03.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-web-security/</loc>
		<lastmod>2022-03-28T12:08:44+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/cisco-web-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cybersecurity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/tool.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/wifi-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/strategy-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/code-injection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/wifi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/s690.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/s390.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/s390s.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-email-security/</loc>
		<lastmod>2022-03-28T12:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/cisco-email-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/detective.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/research.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/animals.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-duo/</loc>
		<lastmod>2022-03-28T12:09:04+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/ciscoduo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/11/chip.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/11/protection-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/11/strategy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/bezpieczenstwo-chmury-publicznej/</loc>
		<lastmod>2022-03-28T12:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/netcloud.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/02020.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/030303.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/040404.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/0101.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/sposoby-ochrony-sieci/segmentacja-sieci/</loc>
		<lastmod>2022-03-28T12:09:29+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/segmentacja.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/netlan01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/minssdsd-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/zagrozenia-w-sieci/inzynieria-spoleczna/</loc>
		<lastmod>2022-03-28T12:09:37+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/inzynieria_spoleczna.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/is01.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/is02.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/SHIELD.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/blog/czy-placenie-okupu-jest-legalne/</loc>
		<lastmod>2022-03-28T12:10:59+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/okup-ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/ransom_okup.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-advanced-malware-protection-amp/</loc>
		<lastmod>2022-03-28T15:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/08/CISCO-NGFW.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/safebox.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/radar.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/bug.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1550816700795.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1531981328095.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/1559611493308.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/raport-bezpieczenstwa-osint-open-source-intelligence/</loc>
		<lastmod>2022-04-25T10:20:13+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/testy-pene.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/testy-ext.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/04/webinar-osint.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/04/osint-promo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/04/raport.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/04/8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/rozwiazania-ochrony-sieci/cisco-secure-network-analytics/</loc>
		<lastmod>2023-11-22T13:36:55+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/10/Cisco-Stealthwatch.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/network-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/machine-learning.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/cryptocurrency.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2021/12/error.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-thousandeyes/</loc>
		<lastmod>2025-10-07T13:12:27+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2023/12/abstract-eye-portrait-young-women-elegance-generated-by-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-kenna-security/</loc>
		<lastmod>2025-10-07T13:14:31+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/testy_penetracyjne.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-xdr/</loc>
		<lastmod>2025-10-07T13:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2023/12/177127.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-sase/</loc>
		<lastmod>2025-10-07T13:15:37+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/03/testy-pene.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-workload/</loc>
		<lastmod>2025-10-07T13:16:13+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/testy-Cisco-Workload.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-anyconnect/</loc>
		<lastmod>2025-10-07T13:16:37+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2022/02/testy-anyconncet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-cloudlock/</loc>
		<lastmod>2025-10-07T13:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/testy-coudlock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-web-security/</loc>
		<lastmod>2025-10-07T13:17:27+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/testy-web-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-esa/</loc>
		<lastmod>2025-10-07T13:17:47+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/testy-esa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-duo/</loc>
		<lastmod>2025-10-07T13:18:08+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/testy-duo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-ise/</loc>
		<lastmod>2025-10-07T13:18:29+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/testy-ise.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-amp/</loc>
		<lastmod>2025-10-07T13:18:52+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/testy-amp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-secure-network-analytics/</loc>
		<lastmod>2025-10-07T13:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/11/testy-stealth.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-umbrella/</loc>
		<lastmod>2025-10-07T13:19:44+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/testy-umbrella.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ochronasieci.pl/testy-zabezpieczen/testy-cisco-next-generation-firewall/</loc>
		<lastmod>2025-10-07T13:20:11+00:00</lastmod>
		<image:image>
			<image:loc>https://ochronasieci.pl/wp-content/uploads/2019/05/testy-ngfw.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->