<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.harmonic.security</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/about</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/company/partner-program</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/get-demo</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/company/events</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/company/careers</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/contact-us</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/feedback-examples</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/hipaa-business-associate-subcontrator-agreement</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/hippa-business-associate-agreement</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/hssa</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/harmonic-end-user-license-agreement</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/subprocessors</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/dpa</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/brand</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/mcp-sneakpeek</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/thank-you-dq</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/thank-you</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/glossary-of-terms</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/partner-deal-registration</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/form-page</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/illuminate</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/amplify-partner-training</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/get-demo-copy</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/ai-agent-security-mcp-gateway</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/ai-usage-governance</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/ai-usage-intelligence</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/browser-based-genai-security</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/dlp-for-genai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/genai-compliance-regulated-industries</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/healthcare</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/insurance</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/legal</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/securing-claude-enterprise</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/shadow-ai-detection</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/solutions/technology</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/products/command</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/products/explore</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/products/guide</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/2025-what-lies-ahead-in-securing-genai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/a-cisos-guide-to-mcp-risks</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/a-year-after-deepseek-launch-1-in-12-employees-used-china-based-ai-tools-in-the-last-month-but-kimi-moonshot-way-ahead-of-all-other-chinese-ai-tools-hiding-in-your-enterprise</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/advisor360-accelerates-ai-adoption-while-strengthening-data-protection</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/agents-mcp-and-why-your-security-stack-probably-isnt-keeping-up</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/ai-and-data-protection-laws-a-primer-for-security-leaders</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/ai-asset-inventories-guide</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/ai-governance-and-control-in-the-healthcare-industry</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/apple-intelligence-balancing-privacy-positioning-with-embracing-ai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/assessing-ai-threats-revolution-or-evolution</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/avoiding-dlp-overload-security-awareness-workflows-that-unburden-the-security-team</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/case-study-private-equity</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/chatgpt-atlas-protecting-employee-use-of-ai-browsers</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/chatgpt-one-year-on-how-10-000-ai-tools-have-changed-the-workplace-and-redefined-data-security</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/ciso-guide-to-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/code-red-analyzing-china-based-app-use</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/code-red-analyzing-chinese-based-app-use-1afe6</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/colorado-implements-americas-first-comprehensive-ai-law</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/data-protection-in-1-minute</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/deepseek-and-the-genai-block-dilemma-a-no-win-situation</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/deepseek-security-and-data-privacy-concerns</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/dragons-byte-securing-the-ai-realm-in-2024</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/employees-using-genai-upload-data-to-over-8-apps-every-month-with-nearly-half-47-of-use-geared-towards-content-creation</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/engineering-at-harmonic-lessons-from-our-latest-experiments-in-model-tuning</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/esg-reinventing-data-loss-prevention-adapting-data-security-to-the-generative-ai-era</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/esg-technical-review-take-advantage-of-generative-ai-securely-with-harmonic-security</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/eu-ai-act-explained-what-it-means-for-ai-regulation-and-businesses</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/extreme-transparency-our-approach-to-building-trust-with-customers</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/file-and-error-analyzing-sensitive-content-in-files-with-harmonic</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/from-ai-blind-spots-to-usage-intelligence-apax</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/from-copilot-to-devin-the-evolution-of-coding-assistants-and-how-to-overcome-risks-to-ip</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/from-invisible-to-governed-taking-control-of-ai-across-a-major-uk-rail-operator</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/from-payrolls-to-patents-the-spectrum-of-data-leaked-into-genai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/from-payrolls-to-patents-the-spectrum-of-data-leaked-into-genai-copy</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/gartner-innovation-insight-mcp-gateway</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/gearing-up-for-success-fueling-harmonics-journey-with-new-series-a-funding</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/gemini-vs-chatgpt-comparing-data-privacy-policies</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/genai-assessment-report-sample</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/genai-data-exposure-report-fa6wt</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/genai-in-the-enterprise-its-getting-personal</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/genai-security-a-case-for-using-nist-csf</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/genai-unleashed</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/genai-unleashed-four-key-insights-from-our-new-study</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/getting-real-about-partnerships-5-concrete-ways-we-partner-for-success</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/governing-ai-use-in-the-insurance-industry-creating-and-enforcing-effective-policies-for-secure-and-responsible-ai-use</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/governing-genai-in-private-equity-how-to-create-and-enforce-effective-ai-usage-policies</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/guide-securing-claude-products</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-at-rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-insights</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-insights-launches-enabling-enterprises-to-adopt-genai-without-worrying-about-the-security-of-their-data</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-named-as-a-representative-vendor-in-the-2024-gartner-r-innovation-guide-for-generative-ai-in-trust-risk-and-security-management-report</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-origins-and-the-failures-of-legacy-data-protection</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-overview-video</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-product-update-april-2025</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-product-update-february-2025</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-product-update-january-2025</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-product-update-november-2024</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-product-update-september-2025</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-protect-launches-to-provide-zero-touch-data-protection-for-the-genai-era</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-protect-overview-datasheet</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-protect-saves-75-of-time-and-cost-compared-with-standard-dlp-approaches</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-and-knowbe4-integration-secure-genai-usage</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-announces-new-board-member</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-executive-overview</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-for-securing-claude-cowork</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-launches-mcp-gateway-providing-complete-visibility-and-control-over-an-organizations-agentic-ai-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-new-beginnings</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-now-available-on-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-platform-deepdive</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-raises-17-5-million-series-a-to-accelerate-zero-touch-data-protection-to-market</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/harmonic-security-selected-as-finalist-for-rsa-conference-2024-innovation-sandbox-contest</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/hopes-for-the-global-ai-summit</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/how-a-global-healthcare-company-shifted-beyond-dlp-to-govern-ai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/how-harmonic-and-tines-help-steer-your-organization-towards-safe-ai-adoption</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/how-many-ai-tools-are-employees-using-more-than-you-think-and-often-with-personal-accounts</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/how-to-detect-and-mitigate-shadow-ai-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/how-to-enforce-your-ai-policy-part-1-picking-the-right-employee-groups</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/insights-on-security-and-startups-with-rinki-sethi</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/insurance-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/introducing-harmonic-protect-zero-touch-data-protection-for-genai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/introducing-harmonics-entra-id-integration</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/introducing-our-best-practice-guide-for-securing-genai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/introducing-riskrubric-a-new-standard-for-evaluating-ai-model-safety</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/introducing-the-harmonic-amplify-partner-program</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/introducing-the-new-harmonic-security-brand</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/is-your-data-safe-in-genai-apps-how-ai-tools-can-expose-sensitive-company-data</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/making-sense-of-the-agentic-ai-landscape</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/marcos-marrero-a-passion-for-cybersecurity-is-key-to-success</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/mcp-gateway-datasheet</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/mcp-security-risks-and-how-to-regain-control-of-agentic-ai-workflows</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/measure-your-security-program-impact-with-enhanced-risk-reporting</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/munawar-valiji-from-systems-engineer-to-ciso</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/new-research-the-data-leaking-into-genai-tools</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/open-letter-65-signatories-urge-government-to-take-four-steps-to-make-uk-a-global-cyber-leader</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/operation-stargate-and-the-ai-arms-race-with-china</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/partner-program-overview-dmp0g</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/product-update-october-2024</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/protect-insurance-data-from-leaking-into-genai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/reducing-shadow-ai-risks-applying-lessons-from-the-prohibition-era</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/results-from-a-third-party-assessment-of-harmonic-protect</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/secure-genai-adoption-a-ciso-guide-to-overcoming-data-privacy-challenges</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/securing-chatgpt-enterprise-guide</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/securing-claude-cowork-a-security-practitioners-guide</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/securing-copilot-for-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/securing-sensitive-data-in-perplexity-ai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/shadow-ai---should-i-be-worried</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/tailor-interventions-for-a-secure-and-exceptional-user-experience</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/the-ai-security-market-is-growing-fast-harmonic-is-built-to-help-partners-win-it</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/the-ai-tightrope-balancing-innovation-and-exposure</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/the-hidden-cost-of-free-ai-writing-tools-analyzing-usage-of-grammarly-and-quillbot-in-the-enterprise</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/the-security-blueprint-for-microsoft-365-copilot-safeguard-your-data</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/the-state-of-dlp-in-2025-enterprises-struggle-with-complexity-noise-and-genai-risks</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/the-uk-fly-wheel-time-to-win</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/the-vanilla-ice-guide-to-ai-usage-policies-critiquing-4-common-approaches</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/top-ai-apps-training-on-your-data---june-2024</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/top-ai-apps-training-on-your-data---may-2024</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/transforming-banking-with-ai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/transforming-healthcare-with-ai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/transforming-technology-with-ai</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/uk-cyber-flywheel-round-2-from-alignment-to-execution</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/unhinged-valentines-muse</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/video-harmonic-insights</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/video-how-to-prevent-genai-data-leaks-insurance-companies</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/video-mcp-gateway-demo</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/video-protecting-sensitive-data-in-microsoft-copilot-mp4</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/video-rsa-innovation-sandbox-pitch</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/video-securing-copilot-for-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/video-unsupervised-learning-harmonic-securitys-unique-approach-to-ai-data-protection</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/webinar-product-wrap-up-august-2025</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/what-22-million-enterprise-ai-prompts-reveal-about-shadow-ai-in-2025</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/what-cisos-are-concerned-about-generative-ai-and-data-protection-in-2024</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/why-enterprise-ai-governance-is-broken-and-what-comes-next</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/why-genai-usage-reporting-fails-and-why-that-matters</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/why-sases-suck-at-controlling-ai-use</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/why-security-teams-should-build-user-personas</loc>
    </url>
    <url>
        <loc>https://www.harmonic.security/resources/wolf-in-sheeps-clothing-security-implications-of-openais-gpt-store</loc>
    </url>
</urlset>