<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="/__sitemap__/style.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    <url>
        <loc>https://cybersecurity.k2.tech/</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/about</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/contacts</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/mediacenter</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/privacy-policy</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/search</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/soc</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/kompleksno-zashchishchaem-82-filiala-gosuchrezhdeniya-v-formate-24-7</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/kompleksno-zashchitili-gosudarstvennoe-uchrezhdenie-s-gis-vtoroy-kategorii-znachimosti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/kompleksnyy-audit-i-strategirovanie-ib-protsessov-it-distribyutora</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/kontrol-polzovateley-dlya-krupnogo-riteylera</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/likvidirovali-posledstviya-ataki-na-krupnuyu-strakhovuyu-kompaniyu</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/obespechenie-dostupnosti-veb-portala-krupnoy-kompanii-dlya-polzovateley</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/okazyvaem-tekhnicheskuyu-podderzhku-sredstv-zashchity-it-infrastruktury-krupnogo-rossiyskogo-perevoz</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/vnedrili-otechestvennuyu-dlp</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/vystroili-kompleksnuyu-zashchitu-7-ispdn-v-krupnoy-strakhovoy-kompanii</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/vystroili-protsessy-kontrolya-deystviy-privilegirovannykh-polzovateley-v-informatsionnykh-sistemakh-</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/za-13-dney-proveli-testirovanie-na-proniknovenie-v-krupnom-banke</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/za-70-dney-lokalizovali-i-zashchitili-infrastrukturu-rossiyskogo-filiala-inostrannogo-banka</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/za-132-rabochikh-dney-proveli-kompleksnyy-audit-po-152-fz-v-krupnom-riteylere</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/za-nbsp-6-nbsp-mesyatsev-realizovali-bezopasnuyu-lokalizatsiyu-dlya-promyshlennogo-predpriyatiya</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/cases/zashchita-veb-sayta-magazina-s-ezhemesyachnoy-auditoriey-20-mln-chelovek</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/2-aprelya-v-11-00-primem-uchastie-v-efire-am-live-pro-kommercheskie-soc</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/2-sentyabrya-vstrechaemsya-na-tech2b-conf-2025-konferentsii-dlya-it-rukovoditeley</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/4-5-marta-vstrechaemsya-na-ib-asu-tp-kvo-2025</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/6-8-noyabrya-vstrechaemsya-na-nbsp-soc-forum-2024</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/10-nbsp-aprelya-vstrechaemsya-na-nbsp-ciso-forum</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/12-aprelya-vstrechaemsya-na-ciso-forum-2024</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/beskonechnyy-potok-kiberbezopasnosti-kak-rossiyskiy-biznes-vnedryaet-devsecops-i-zashchishchaet</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/check-point-competence-ep-02-k2-kiberbezopasnost</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/cloud-security-services-bezopasnoe-oblako-dlya-biznesa</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/delo-152-fz-bumazhnaya-vs-realnaya-kiberzashchita</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/dialog-o-glavnom-152-fz-i-oblako</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/fokus-na-nbsp-soc-kak-rossiyskiy-biznes-stroit-rezultativnyy-monitoring</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/k2-kiberbezopasnost-partner-konferentsii-soc-tech-2024</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/kiberbez-i-zakon-praktika-v-riteyle</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/maskirovanie-so-smyslom-kogda-biznesu-nuzhno-obezlichivat-dannye</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/mify-o-soc-kak-rabotaet-monitoring-kiberbezopasnosti-na-samom-dele</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/missiya-vypolnima-kak-effektivno-zashchitit-kii</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/novye-shtrafy-za-utechki-pdn-kak-biznesu-podgotovitsya-k-aktualnym-vyzovam</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/ot-slepoy-zony-k-polnomu-kontrolyu-effektivnyy-analiz-trafika-v-oblakakh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/put-samuraya-soc-sozdayte-deystvitelno-rabochiy-workflow-intsidenta</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/razbor-poletov-novye-zakonoproekty-ob-utechkakh-pdn</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/reshit-golovolomku-kak-zashchitit-veb-prilozheniya-api-i-mikroservisy-s-pomoshchyu-odnoy-platformy</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/ukroshchaya-api-kak-vystroit-rezultativnuyu-zashchitu</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/events/zashchita-kii-optimalnyy-marshrut-prakticheskie-keysy-obespecheniya-bezopasnosti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/44-kompaniy-nazvali-nekhvatku-ib-spetsialistov-glavnoy-prichinoy-nizkogo-urovnya-kiberbezopasnosti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/62-rossiyskikh-korporatsiy-prodolzhayut-ispolzovat-zarubezhnye-ngfw</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/64-korporatsiy-otdayut-kompleksnyy-monitoring-i-nbsp-reagirovanie-na-nbsp-kiberugrozy-na-nbsp-autsor</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/70-kompaniy-ne-sootvetstvuyut-trebovaniyam-zakona-o-zashchite-personalnykh-dannykh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/71-kompaniy-c-kriticheskoy-informatsionnoy-infrastrukturoy-slozhno-organizovat-ee-bezopasnost</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/83-korporatsiy-udelyayut-vnimanie-bezopasnoy-razrabotke</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/bolshe-poloviny-subektov-kii-ne-uspeyut-vypolnit-trebovaniya-ukaza-prezidenta-250-i-polnostyu-pereyt</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/garda-i-k2-kiberbezopasnost-zashchityat-dannye-rossiyskikh-kompaniy</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/issledovanie-83-rossiyskikh-korporatsiy-schitayut-soc-otvetom-na-rost-kiberugroz-</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/itogi-testa-pt-ngfw-ot-positive-technologies</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-13-dney-provodila-testovye-kiberataki-na-krupnyy-bank-dlya-proverki-ego-urovnya</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-bolshe-poloviny-kompaniy-ne-gotovy-k-uzhestocheniyu-zakonov-o-persdannykh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-nashla-dostoynuyu-zamenu-microsoft-azure-2fa-indeed-am-ot-kompanii-indid</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-pobedila-na-kiberarene-gis-days-2025</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-poluchila-sertifikat-laquo-laboratorii-kasperskogo-raquo-v-oblasti-zashch</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-pomogla-krupnomu-banku-nayti-kastomizirovannoe-reshenie-dlya-zashchity-dostupa-k</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-preduprezhdaet-odin-iz-krupnykh-organov-gosudarstvennoy-vlasti-o-vozmozhnykh-kib</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-protestirovala-ngfw-ot-positive-technologies</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-protestirovala-platformu-r-vision-tdp</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-sponsor-chempionata-rossii-po-motokrossu-na-kvadrotsiklakh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-uspeshno-proshla-sertifikatsionnyy-audit-smib</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-voshla-v-top-3-ib-integratorov-rossii</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-vykhodit-na-rynok-kommercheskikh-soc</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-zapustila-servis-ekstrennogo-vosstanovleniya-riteyla-i-fmcg-posle-kiberatak</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-kiberbezopasnost-zashchishchaet-ot-kiberatak-set-restoranov-bystrogo-pitaniya</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2-nbsp-kiberbezopasnost-stala-avtorizovannym-servisnym-tsentrom-po-nbsp-produktam-positive-technolo</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/k2tekh-i-k2-kiberbezopasnost-zapustili-uslugu-po-zashchite-ot-virusov-shifrovalshchikov</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/khokkeynaya-komanda-gasoilers-otkryvaet-sezon-pobed-pri-podderzhke-k2-kiberbezopasnost</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/kiberzashchita-perimetra</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/laboratoriya-kasperskogo-nazvala-k2-kiberbezopasnost-mssp-partnerom-goda</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/lish-u-nbsp-poloviny-rossiyskikh-kompaniy-est-vse-neobkhodimye-sredstva-zashchity-persdannykh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/ne-ngfw-edinym-pochemu-biznesu-nuzhno-upravlyat-dostupom-k-seti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/obshchedostupnye-pdn-i-pdn-razreshennye-subektom-pdn-dlya-rasprostraneniya-v-chem-otlichiya</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/pochti-polovina-it-rukovoditeley-ne-znayut-chto-takoe-maskirovanie-dannykh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/pochti-tret-rossiyskikh-kompaniy-stalkivalis-s-intsidentami-bezopasnosti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/populyarnost-security-operations-center-u-rossiyskikh-kompaniy-rastet</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/praktika-na-nbsp-realnykh-keysakh-soc-k2-nbsp-kiberbezopasnosti-ottochil-navyki-na-nbsp-standoff-cyb</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/prikaz-fstek-8470-117-kak-novye-trebovaniya-po-informatsionnoy-bezopasnosti-izmenyat-rabotu-gossektora</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/rossiyskie-kompanii-ozabotilis-bezopasnostyu</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/rossiyskie-korporatsii-nazvali-nedostatki-resheniy-dlya-zashchity-dannykh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/rossiyskiy-biznes-nazval-virusov-shifrovalshchikov-glavnoy-ugrozoy-setevoy-bezopasnosti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/rossiyskiy-biznes-poluchil-besplatnyy-onlayn-servis-dlya-bystroy-otsenki-kiberustoychivosti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/security-operations-center-chto-eto-takoe-i-dlya-chego-nuzhen-tsentr-monitoringa-informatsionnoy-bez</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/setevaya-bezopasnost-v-oblake-ili-kak-avtomatizirovat-razvertyvanie-virtualnykh-ngfw</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/signatury-dlya-ne-open-source-ili-kak-zastavit-ngfw-rabotat</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/soc-k2-kiberbezopasnost-odnim-iz-pervykh-poluchil-sertifikat-susit</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/tolko-tret-kompaniy-uverena-v-svoey-sisteme-zashchity-personalnykh-dannykh-</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/trend-na-ib-osoznannost-91-rossiyskikh-kompaniy-vazhnee-realnaya-kiberzashchita-chem-vypolnenie-treb</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/trendy-v-nbsp-ib-kak-izmenilas-otrasl-v-nbsp-2023-godu-i-nbsp-chego-zhdat-v-2024</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/v-2025-godu-bolshe-poloviny-korporatsiy-uvelichili-byudzhet-na-kiberbezopasnost-na-20-40</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/press_releases/v-gazprom-burenii-vnedrili-importonezavisimuyu-sistemu-dlya-zashchity-ot-utechek-dannyh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/cloud-security-services</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/kontrol-deystviy-polzovateley-i-zashchita-ot-utechek</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/tekhnicheskaya-podderzhka-sredstv-zashchity-informatsii</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/khardening-os-asu-tp</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/kompleksnaya-bezopasnost-obektov-kii</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/kontrol-konfiguratsiy-komponentov-sistem-asu-tp</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/migratsiya-s-inostrannykh-szi</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/monitoring-bezopasnosti-promyshlennoy-seti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/obespechenie-bezopasnosti-obektov-kii-187-fz</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/promyshlennye-mezhsetevye-ekrany</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/tekhnicheskaya-podderzhka-po-servisnoy-modeli</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/bezopasnost-kii-i-asu-tp/zashchita-konechnykh-tochek</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti/avtomatizatsiya-upravleniya-ib-riskami-i-sootvetstviya-trebovaniyam-sgrc</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti/ekspertnyy-audit-ib</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti/postroenie-suib-i-podgotovka-k-sertifikatsii</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti/povyshenie-osvedomlennosti-v-oblasti-ib-security-awareness</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti/sootvetstvie-trebovaniyam-tsb-v-oblasti-ib</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti/sootvetstvie-zakonodatelstvu-o-pdn-fz-152</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/konsalting-v-oblasti-informatsionnoy-bezopasnosti/zashchita-gis-i-attestatsiya</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/kontrol-deystviy-polzovateley-i-zashchita-ot-utechek/kontrol-privilegirovannykh-polzovateley-pam</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/kontrol-deystviy-polzovateley-i-zashchita-ot-utechek/obespechenie-zashchishchennogo-obmena-faylami-vdr</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/kontrol-deystviy-polzovateley-i-zashchita-ot-utechek/predotvrashchenie-utechek-konfidentsialnoy-informatsii-dlp</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/kontrol-deystviy-polzovateley-i-zashchita-ot-utechek/upravlenie-nestrukturirovannymi-dannymi-dag-dcap</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/kontrol-deystviy-polzovateley-i-zashchita-ot-utechek/zashchita-dokumentov-ot-kopirovaniya-markirovanie-dokumentov-ild</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib/avtomatizirovannoe-reagirovanie-na-intsidenty-ib-irp-soar</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib/kiberrazvedka-ti</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib/monitoring-sobytiy-i-intsidentov-ib-siem</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib/podklyuchenie-k-gossopka</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib/podklyuchenie-k-tsentru-monitoringa-kiberbezopasnosti-soc</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib/postroenie-tsentrov-monitoringa-i-reagirovaniya-soc</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/monitoring-i-reagirovanie-na-intsidenty-ib/rassledovanie-intsidentov-ib</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost/mezhsetevoe-ekranirovanie-ngfw</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost/obnaruzhenie-setevykh-anomaliy-nta-ndr</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost/tekhnicheskaya-podderzhka-</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost/upravlenie-dostupom-k-seti-nac</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost/upravlenie-politikami-setevoy-bezopasnosti-npm</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost/zashchita-kanalov-svyazi-vpn-</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/setevaya-bezopasnost/zashchita-ot-ddos-atak</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/antivirusnaya-zashchita</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/bezopasnost-korporativnoy-pochty-antispam-antiphishing</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/bezopasnost-mobilnykh-ustroystv-mdm</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/dinamicheskie-metody-analiza-sandbox</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/kontentnaya-filtratsiya-web-trafika-proxy</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/mnogofaktornaya-autentifikatsiya-mfa</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/obmannye-tekhnologii-deception</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/tekhnicheskaya-podderzhka</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/zashchita-ot-nsd</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/zashchita-ot-ugroz-na-konechnykh-ustroystvakh-edr-i-xdr</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-infrastruktury/zashchita-virtualnykh-sred</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/devsecops</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/maskirovanie-baz-dannykh</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/otsenka-urovnya-bezopasnosti-prilozheniy-sast-dast</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/sistema-edinogo-vkhoda-v-veb-prilozheniya-sso</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/tekh-podderzhka</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/upravlenie-uyazvimostyami-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/zashchita-baz-dannykh-dam-dbfw</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/zashchita-konteynerov-container-security</loc>
    </url>
    <url>
        <loc>https://cybersecurity.k2.tech/services/zashchita-prilozheniy/zashchita-veb-prilozheniy-i-api-waf-waap</loc>
    </url>
</urlset>
<!-- XML Sitemap generated by @nuxtjs/sitemap v7.2.10 at 2026-04-03T10:29:27.648Z -->