<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.todyl.com</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/utility-pages/animations</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/checkout</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/utility-pages/blocks/content-cards</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/order-confirmation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/paypal-checkout</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/search</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/utility-pages/styles-and-components</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/careers</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/contact</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/request-pricing</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/platform/platform-overview</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/platform/secure-access-service-edge</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/platform/security-information-event-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/platform/managed-extended-detection-response</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/platform/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/platform/governance-risk-compliance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/solutions/managed-service-providers</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/solutions/solution-providers</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/solutions/healthcare-cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/solutions/financial-services-cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/solutions/manufacturing-cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/solutions/education-cybersecurity-solutions</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/events</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/terms</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/privacy</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/system-description</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/ode</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/support</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/meet-mxdr</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/mxdr-deep-dive</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/partner-deal-registration</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/why-todyl</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/threat-research</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/roadshow/todyl-transformation-denver</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/threat-research/the-soze-syndicate</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/meet-jaws</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/meet-brandon</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/meet-w-zach-day</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/jonathon-dejeu</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/santino-sobelman</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/jimmy</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/andrew-scott</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/scott-mclean</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/brian-robinson</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/gene-mcgowan</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/aj-erskin</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/drew</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/heath</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/justin-suzuki</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/matthew-carlesi</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/mjn</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/mds</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/mjp</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/zach</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/zachg</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/connor</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/kh</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/meet-with-todyl</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/ae1-demo-scheduler</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/ae2-demo-scheduler</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/ae3-demo-scheduler</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/sr-ae-demo-scheduler</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/strategic-ae-demo-scheduler</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/get-a-demo-events-presentation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/landing/spectra</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/get-a-demo-events</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/campaign/security-maturity-model</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/solutions/identity-threat-detection-response</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/roadshow/todyl-transformation-chicago-2025</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/vs/arctic-wolf</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/assessments/msp-cybersecurity-assessment</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/10-practical-defenses-securing-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/5-key-elements-effective-mdr-providers</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/5-pillars-security-program-growth-2025</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/a-stroll-through-powershell-script-reversing</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/accelerating-msp-business-growth-todyl-deal-desk</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/achieving-zero-trust-with-sase-a-practical-roadmap-for-modern-network-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/addressing-firewall-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/advanced-persistent-threats-apts-explained</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/akira-ransomware-persistent-threat-msp</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/akira-ransomware-threat-assessment-scalable-raas-operation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/aligning-technology-implementation-to-business-outcomes</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/anomaly-framework</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/are-we-numb-to-threats</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/becs-in-the-wild-when-millions-of-people-are-expecting-the-same-email</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/benefits-consolidating-security-stack</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/business-case-cyber-threat-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/clickfix-evolution-copy-paste-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/clickfix-fake-captcha-real-damage</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/combining-edr-ngav-defense-in-depth</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/compliance-beginning-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/compliance-frameworks-challenges-solutions</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/compliance-reporting-siem</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/conditional-access-transforms-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/credential-theft-attacks-msp-clients</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/critical-patches-across-major-vendors-demand-action</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-insurance-crisis-why-msps-clients-struggle</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-insurance-requirements-based-on-industry</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-insurance-security-assurance-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-insurance-vs-warranties-risk-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-resilience-security-compliance-insurance-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-threat-detection-strategies-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-threat-prevention-strategies-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-threat-recovery-strategies-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-threat-response-strategies-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyber-threats-dont-take-time-off</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cyberchef-decoding</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cybersecurity-artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cybersecurity-insurance-tech-guide</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/cybersecurity-machine-learning</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/defending-against-in-memory-attacks-with-endpoint-security-and-memory-threat-protection</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/defense-strategies-against-employee-impersonation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/different-sase-capabilities</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/disadvantages-using-vpns</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/dissecting-2025-zero-days</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/do-i-need-cyber-insurance-as-a-small-business</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/dos-donts-applying-for-cyber-insurance-policy</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/endpoint-security-vendor-questions</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/epibrowser</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/evaluating-free-open-source-siem-tools-2026</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/fortijump-fortimanager-zero-day-vulnerability-explained</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/geopolitical-emerging-cyber-risks-smbs</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-msps-build-lasting-client-relationships</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-mxdr-helps-improve-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-organizations-can-combat-bec</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-siem-helps-detect-insider-threats</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-the-3cx-supply-chain-attack-started</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-to-complete-cmmc-level-1-self-assessment-step-by-step-walkthrough</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-to-conduct-cyber-threat-hunts</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-to-deliver-an-effective-qbr</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-to-eliminate-cybersecurity-blind-spots-siem</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-to-find-best-endpoint-security-solution</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-to-increase-trust-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-todyl-mxdr-reduces-noise-and-alert-fatigue</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/how-we-built-web-proxy-v2</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/identity-security-gap-assessment-guide-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/importance-of-ssl-inspection</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/improving-visibility-and-powering-investigation-siem-and-case</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/incident-response-best-practices</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/introducing-the-todyl-community</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/investigating-malicious-use-onenote-deploy-qbot</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/iran-conflict-and-cyber-risk-what-north-american-organizations-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/iran-conflict-cyber-threat-smb-msp-risk</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/key-takeaways-cisa-warning-malicious-use-legitimate-rmm-tools</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/lan-zerotrust-compliance-use-cases</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/lan-zerotrust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/lapsus-okta-detecting-malicious-activity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/leveraging-sase-ddos-outage</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/living-off-land-attacks</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/look-for-consolidated-security-platform</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/lower-latency-more-resilient-higher-performing-secure-global-network</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/malware-vs-ransomware-vs-living-off-the-land-comparing-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/managed-cloud-siem</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/massive-wave-network-security-vulnerabilities-demands-immediate-action</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/mature-cybersecurity-processes-clear-model</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/mdr-platform-breadth-depth-matters</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/merrymount-modernized-cybersecurity-next-dimension</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-challenges-2025</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-cybersecurity-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-goal-setting-tips</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-identity-protection-competitive-advantage</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-security-build-vs-buy-soc-costs</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-security-kpis-business-outcomes-metrics</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-security-maturity-assessment-stuck-2025</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-security-monitoring-strategy-identity-cloud</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msp-zero-day-response-plan-incident-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/msps-circia-final-rule</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/old-gold-tackling-persistent-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/one-action-msps-address-risk-secure-clients</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/onestart-ai-browser-deception</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/ongoing-security-framework-program</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/overcoming-dns-challenges-with-secure-dns-v2</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/overlap-sase-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/partner-spotlight-917-solutions</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/partner-spotlight-anchorsix</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/partner-spotlight-gotech-it</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/practical-security-framework-implementation-guide</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/preparing-for-cmmc-level-1-what-your-organization-needs-to-do</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/project-autobahn-removing-the-speed-limit-from-secure-communication</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/proposed-age-verification-bills-and-the-impact-on-vpns-and-sase</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/pwnkit-vulnerability-advisory-local-privilege-escalation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/real-cost-doing-nothing-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/red-blue-purple-teams-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/reduce-shadow-it-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/reducing-breaches-improving-productivity-sase</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/remote-management-tools-vulnerabilities-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/resilience-perimeter-less-defense-in-depth</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/rethinking-vulnerability-remediation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/rising-threat-malicious-ai-what-every-organization-needs-to-know</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/risk-management-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/role-of-process-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/role-technology-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-best-practices</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-capabilities-benefits-todyl</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-compliance-requirements</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-cyber-insurance-requirements</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-static-ip-engineeing</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-use-cases-software-defined-perimeter</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-values-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sase-zero-trust-network-access</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/security-first-it-operations</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/security-frameworks-explained</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/security-maturity-the-role-of-people-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/siem-benefits</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/siem-incident-response</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/siem-provider</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/simplifying-cmmc-level-1-with-todyl-grc</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/simplifying-cybersecurity-maturity-managed-cloud-siem</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/sonicwall-ssl-vpn-vulnerability-protecting-clients</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/spyboy-terminator-threat-advisory</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/stopping-identity-threats-itdr-mxdr</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/strategic-approach-to-data-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/streamlining-security-compliance-information-gathering-assessments</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/streamlining-zero-trust-security-jumpcloud-todyl</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/texas-sb-2610-insights-for-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/the-rise-of-a-cybercrime-alliance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/the-value-of-cybersecurity-for-smbs</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/thinking-red-acting-blue</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/third-party-security-certification-msp-competitive-edge</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-advisory-3cx-softphone-telephony-campaign</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-advisory-business-email-compromise-campaign-ovpn</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-advisory-email-account-compromise</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-advisory-new-icedid-trojan-campaign-2022</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-advisory-pdfast-freeware-compromise</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-advisory-socgholish-malware</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-advisory-sql-injection-forticlient-cve</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-breakdown-remote-access-credential-dumping</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/todyl-success-story-penetration-test-results-mxdr</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/top-5-myths-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/transforming-cyber-insurance-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/understanding-pitfalls-rdp</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/united-states-national-cybersecurity-strategy-impact-on-the-channel</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/using-sase-secure-remote-access</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/using-sase-to-reduce-your-attack-surfaces</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/vpn-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/we-need-siem-six-benefits</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/webp-threat-advisory</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/what-a-dram-can-do-for-you</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-businesses-need-access-control</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-businesses-need-cyber-threat-hunting</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-businesses-need-security-awareness-trainings</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-i-joined-todyl-daniel-choi</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-i-joined-todyl-david-langlands</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-i-joined-todyl-ken-patterson</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-i-joined-todyl-konstantin-belyalov</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-i-joined-todyl-rick-hensley</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-i-joined-todyl-terry-nelms</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-msps-prescriptive-model</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-msps-prioritize-cis-controls-v8-1</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/why-sase-future-of-network-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/xworm4-threat-advisory</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/xworm4-threat-advisory-part-2</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/zero-day-attacks-false-alarms</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog/zero-trust-strategy-capabilities</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/ahsan-ayub</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/andrew-scott</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/channu-sannappanavar</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/chenta-lee</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/cyberqp</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/david-langlands</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/erik-baba</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/john-nellen</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/keira-stevens</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/ken-patterson</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/nicholas-koken</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/rajiv-motwani</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/rick-hensley</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/sean-savold</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/terry-nelms</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/zach-demeyer</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/authors/zach-dressander</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/compliance-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/grc</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/life-at-todyl</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/lzt</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/mxdr</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/partnerships</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/risk-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/sase</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/siem</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/soar</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/blog-categories/threat-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/inc-5000-2025</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/next-dimension-and-todyl-announce-strategic-security-partnership-to-deliver-unified-cyber-defense-for-the-mid-market</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/rsa-selects-todyl-to-power-security-operations-center-and-collaborate-on-global-identity-intelligence-report</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/series-a-funding-todyl-security-platform-launch</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-defines-the-future-of-unified-cybersecurity-and-assurance-as-platform-momentum-surges</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-enhances-unified-platform-powerful-new-capabilities-threat-risk-and-compliance-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-launches-janus-agentic-ai-for-incident-investigation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-launches-marketplace-to-empower-msps-and-businesses-with-unified-security-and-assurance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-launches-revamped-partner-program-to-strengthen-msp-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-named-one-of-north-americas-fastest-growing-companies-on-the-2025-deloitte-technology-fast-500</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-partners-with-spectra-to-revolutionize-cyber-insurance-solutions-for-msps-and-their-clients</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-raises-50m-in-series-b-funding</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-raises-seed-funding-opens-headquarters-denver</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-recognized-by-crn-for-delivering-next-gen-security-through-trusted-channel-partners</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news/todyl-redefines-msps-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/2025-cybersecurity-insights-and-more</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/breaking-through-the-security-maturity-plateau</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/building-cyber-resilience-in-smb-from-hospitality-to-high-tech-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/building-risk-centric-msp</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/cmmc-basics-for-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/cmmc-for-msps-protecting-defense-contractor-clients</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/cyber-resilience-competitive-advantage</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/cyber-resilience-go-to-market-mastery</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/cyber-resilience-imperative-navigating-the-evolving-risk-landscape</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/from-awareness-to-action-building-a-year-round-security-culture</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/from-tech-expert-to-business-leader-the-msp-transformation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/from-vpn-to-sase-stay-ahead-of-evolving-threats-risks-and-compliance-requirements</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/how-market-changes-create-your-biggest-revenue-opportunity</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/how-msps-thrive-with-eos</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/infosec-world</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/iran-conflict-threat-briefing-what-msps-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/it-nation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/market-changes-driving-msp-revenue-growth</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/mssp-alert-live</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/nerdiocon</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/penetration-testing-incident-response-for-your-msps-prospects-and-clients</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/right-of-boom</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/tackling-business-email-compromise</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/techcon-unplugged</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/the-circia-clock-is-ticking-are-you-ready-for-the-may-2026-deadline</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/the-new-era-of-cyber-insurance-changing-expectations-requirements</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/the-trust-gap-how-msps-turn-security-promises-into-documented-proof</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/transforming-to-a-security-first-msp</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/trumethods-peer-conference</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/trumethods-peer-conference-2</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/win-more-deploy-faster-double-your-security-revenue-in-90-days</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/work-life-balance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/xchange-august</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/xchange-march</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/xchange-nexgen</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event/xchange-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/acting-fast-to-stop-a-weekend-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/boosting-client-satisfaction-through-stack-consolidation</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/comprehensive-cybersecurity-program-cmmc-requirements</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/making-cybersecurity-a-competitive-advantage-to-accelerate-growth</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/midshore-bec</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/partner-ecosystem-turned-security-incident-into-client-win</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/pivoting-to-security-first-to-quickly-scale</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/proactive-security-approach-compliance-queen</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/replacing-rdp-vpn-sase-blueclone</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/securing-patient-data-remote-work</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/stopping-a-ransomware-attack-in-its-tracks</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/streamlining-operations-while-strengthening-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/supporting-construction-companys-growth-secure-remote-access</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/todyl-fast-response-prevents-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/transforming-healthcare-cybersecurity-elevate-it-group</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study/uk-cyber-essentials-compliance-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/2025-msp-cybersecurity-technology-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/endpoint-security-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/evaluating-difference-between-xdr-vs-siem-vs-soar-vs-ueba</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/how-to-choose-managed-detection-and-response-provider</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/how-to-select-sase-solution</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/iran-conflict-middle-east-cyber-threat-landscape-risk-outlook</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/leveraging-siem-for-threat-detection-and-visibility</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/lockbit-ransomware-as-a-service-threat-intelligence-report</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/msp-guide-risk-advisory</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/msp-threat-landscape-2023</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/power-of-consolidated-security-platforms</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/security-maturity-model-it-service-providers</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/state-of-msp-security-maturity-report</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/the-threat-management-playbook-for-msps</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/understanding-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/understanding-the-cmmc-program</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/worker-impersonation-business-email-compromise</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/insights/zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/alicia-kortmeyer</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/chris-weibel</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/darrin-swan</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/james-pellizzi</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/jamie-thinnes</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/jimmy-chowdhury</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/john-nellen</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/kristen-guyler</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/polina-kazakova</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/leadership/rick-hensley</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event-categories/conference</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event-categories/roadshow</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/event-categories/webinar</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/business-growth</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/channels-and-alliances</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/compliance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/cybersecurity-education</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/life-at-todyl</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/managed-extended-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/ransomware</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/secure-access-service-edge</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/security-information-event-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/soar</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/todyl-modules</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/case-study-categories/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/business-growth</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/channels-and-alliances</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/compliance</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/cybersecurity-education</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/life-at-todyl</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/managed-extended-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/ransomware</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/secure-access-service-edge</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/security-information-event-management</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/soar</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/threat-intelligence</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/todyl-modules</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/news-categories/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/partner-events/achieving-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/company-advisors/austin-mcchord</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/company-advisors/charlie-tomeo</loc>
    </url>
    <url>
        <loc>https://www.todyl.com/company-advisors/david-rines</loc>
    </url>
</urlset>