<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://dope.security</loc>
    </url>
    <url>
        <loc>https://dope.security/our-story</loc>
    </url>
    <url>
        <loc>https://dope.security/our-crew</loc>
    </url>
    <url>
        <loc>https://dope.security/behind-the-scenes</loc>
    </url>
    <url>
        <loc>https://dope.security/legal/eula</loc>
    </url>
    <url>
        <loc>https://dope.security/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://dope.security/legal/dpa</loc>
    </url>
    <url>
        <loc>https://dope.security/legal/sla</loc>
    </url>
    <url>
        <loc>https://dope.security/videos/company</loc>
    </url>
    <url>
        <loc>https://dope.security/legal/sub-processor-list</loc>
    </url>
    <url>
        <loc>https://dope.security/newsroom</loc>
    </url>
    <url>
        <loc>https://dope.security/legal/soc-2</loc>
    </url>
    <url>
        <loc>https://dope.security/videos/demos</loc>
    </url>
    <url>
        <loc>https://dope.security/legal/trade-compliance</loc>
    </url>
    <url>
        <loc>https://dope.security/vs/forcepoint</loc>
    </url>
    <url>
        <loc>https://dope.security/vs/zscaler</loc>
    </url>
    <url>
        <loc>https://dope.security/vs/cisco-umbrella</loc>
    </url>
    <url>
        <loc>https://dope.security/vs/netskope</loc>
    </url>
    <url>
        <loc>https://dope.security/podcast</loc>
    </url>
    <url>
        <loc>https://dope.security/blog</loc>
    </url>
    <url>
        <loc>https://dope.security/partner</loc>
    </url>
    <url>
        <loc>https://dope.security/casb-neural</loc>
    </url>
    <url>
        <loc>https://dope.security/dope-swg</loc>
    </url>
    <url>
        <loc>https://dope.security/pricing</loc>
    </url>
    <url>
        <loc>https://dope.security/archive/new-nav</loc>
    </url>
    <url>
        <loc>https://dope.security/events/upcoming</loc>
    </url>
    <url>
        <loc>https://dope.security/events/past-events</loc>
    </url>
    <url>
        <loc>https://dope.security/testimonials</loc>
    </url>
    <url>
        <loc>https://dope.security/define</loc>
    </url>
    <url>
        <loc>https://dope.security/manage-ai</loc>
    </url>
    <url>
        <loc>https://dope.security/post/2023-year-in-review</loc>
    </url>
    <url>
        <loc>https://dope.security/post/agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/ai-dlp-prevent-sensitive-data-leakage</loc>
    </url>
    <url>
        <loc>https://dope.security/post/ai-powered-data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://dope.security/post/best-data-loss-prevention-dlp-tools</loc>
    </url>
    <url>
        <loc>https://dope.security/post/best-secure-web-gateways-swg-in-2025-real-world-tests-on-speed-break-inspect-and-privacy</loc>
    </url>
    <url>
        <loc>https://dope.security/post/blocking-chatgpt-personal</loc>
    </url>
    <url>
        <loc>https://dope.security/post/blocking-personal-claude-accounts-cloud-application-control</loc>
    </url>
    <url>
        <loc>https://dope.security/post/blocking-personal-gmail-hotmail-outlook-at-a-company-3fcff05d7aff</loc>
    </url>
    <url>
        <loc>https://dope.security/post/blocking-personal-uploads-with-cloud-app-controls</loc>
    </url>
    <url>
        <loc>https://dope.security/post/captive-portal</loc>
    </url>
    <url>
        <loc>https://dope.security/post/chatgpt-enterprise-governance-three-layers</loc>
    </url>
    <url>
        <loc>https://dope.security/post/chatgpt-workspace-id-what-it-is-and-how-to-use-it-for-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cisco-umbrella-alternatives-2025-complete-guide</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cisco-umbrella-alternatives-5-best-picks-for-2025</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cisco-umbrella-outages</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cisco-umbrella-pricing-cisco-umbrella-vs-dnsfilter-vs-dope-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cisco-umbrella-replacement-2026</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cisco-umbrella-replacement-a-quick-and-painless-move-to-dope-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cisco-umbrella-review-2025-pros-cons-pricing-who-its-for</loc>
    </url>
    <url>
        <loc>https://dope.security/post/city-of-visalia-dope-security-customer-story</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cloud-dlp-protecting-data-at-rest-saas</loc>
    </url>
    <url>
        <loc>https://dope.security/post/cybersecurity-can-be-design-first-too-73468472fcae</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dlp-cyber-threats</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dns-filtering-vs-secure-web-gateway-7-hidden-gaps-that-hurt-hybrid-work-security-in-2025</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-security-crowdstrike</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-security-for-hospitality</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-security-for-remote-workforces</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-security-for-small-businesses-and-medium-sized-business-smbs</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-security-healthcare</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-security-partners-with-aqaio-to-drive-channel-program-expansion-in-dach</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-security-tailscale</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dope-vs-microsoft-defender</loc>
    </url>
    <url>
        <loc>https://dope.security/post/dopekit-a-stylish-git-template-for-cloud-services</loc>
    </url>
    <url>
        <loc>https://dope.security/post/endpoint-dlp-data-in-motion-explained</loc>
    </url>
    <url>
        <loc>https://dope.security/post/enterprise-web-filter-vs-dns-vs-swg</loc>
    </url>
    <url>
        <loc>https://dope.security/post/first-security-solution-smb-midmarket</loc>
    </url>
    <url>
        <loc>https://dope.security/post/fly-direct</loc>
    </url>
    <url>
        <loc>https://dope.security/post/fortune-100-company-successfully-deploys-dope-security-on-18k-devices-in-record-time</loc>
    </url>
    <url>
        <loc>https://dope.security/post/globalprotect-forticlient-anyconnect-etc-hand-in-hand-with-dope-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/greylock-partners-ditched-cisco-umbrella-for-dope-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/gv-joins-the-first-class-flight</loc>
    </url>
    <url>
        <loc>https://dope.security/post/healthcare-greenfield-sse-case-study</loc>
    </url>
    <url>
        <loc>https://dope.security/post/hiring-dope-people-96eedb8c68ff</loc>
    </url>
    <url>
        <loc>https://dope.security/post/how-rising-data-center-costs-are-driving-sase-sse-price-increases</loc>
    </url>
    <url>
        <loc>https://dope.security/post/instantly-bypass-ssl-errors-7c5496449d42</loc>
    </url>
    <url>
        <loc>https://dope.security/post/interview-how-to-become-a-ciso-with-ty-sbano-vercel-945f050dde65</loc>
    </url>
    <url>
        <loc>https://dope.security/post/introducing-transformers-in-dope-securitys-code-saga-eadff6cddf86</loc>
    </url>
    <url>
        <loc>https://dope.security/post/mcp-servers-new-shadow-it-56-domains-hiding-in-plain-sight</loc>
    </url>
    <url>
        <loc>https://dope.security/post/meet-dopamine-dlp</loc>
    </url>
    <url>
        <loc>https://dope.security/post/microsoft-copilot-security-concerns-oversharing-sharepoint-onedrive</loc>
    </url>
    <url>
        <loc>https://dope.security/post/netskope-review-2025-features-pricing-pros-cons</loc>
    </url>
    <url>
        <loc>https://dope.security/post/netskope-vs-cisco-umbrella-which-is-right-for-your-security-team</loc>
    </url>
    <url>
        <loc>https://dope.security/post/one-click-ai-blocking-and-shadow-ai-detection</loc>
    </url>
    <url>
        <loc>https://dope.security/post/onedrive-file-sharing-security-audit</loc>
    </url>
    <url>
        <loc>https://dope.security/post/outreach-health</loc>
    </url>
    <url>
        <loc>https://dope.security/post/palo-alto-firewall-vs-swg</loc>
    </url>
    <url>
        <loc>https://dope.security/post/plg-just-got-dope-c6521da5238f</loc>
    </url>
    <url>
        <loc>https://dope.security/post/prisma-access-replacement-migration-guide-2025</loc>
    </url>
    <url>
        <loc>https://dope.security/post/prisma-access-vs-endpoint-native-swg</loc>
    </url>
    <url>
        <loc>https://dope.security/post/professional-services-greenfield-swg-case-study</loc>
    </url>
    <url>
        <loc>https://dope.security/post/publicly-shared-files-why-is-it-a-problem</loc>
    </url>
    <url>
        <loc>https://dope.security/post/real-time-policy-updates-for-secure-web-gateway-fd91011c9f61</loc>
    </url>
    <url>
        <loc>https://dope.security/post/remote-hybrid-workforce-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/replace-legacy-dlp</loc>
    </url>
    <url>
        <loc>https://dope.security/post/sase-vs-sse-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://dope.security/post/secure-enterprise-browser-do-you-need-one</loc>
    </url>
    <url>
        <loc>https://dope.security/post/secure-web-gateway-market-trends-2025-2030</loc>
    </url>
    <url>
        <loc>https://dope.security/post/shadow-ai-discover-and-govern</loc>
    </url>
    <url>
        <loc>https://dope.security/post/shadow-it-discovery-playbook</loc>
    </url>
    <url>
        <loc>https://dope.security/post/shadow-it-we-made-it-dope-22a80d1cf866</loc>
    </url>
    <url>
        <loc>https://dope.security/post/soc2-type-2</loc>
    </url>
    <url>
        <loc>https://dope.security/post/ssl-inspection-on-device-vs-cloud-proxy</loc>
    </url>
    <url>
        <loc>https://dope.security/post/the-pillars-of-perpetual-uptime-inside-dope-clouds-reliability-mastery</loc>
    </url>
    <url>
        <loc>https://dope.security/post/tips-from-galactic-senator-grace-chung-head-of-global-analyst-relations-at-trellix</loc>
    </url>
    <url>
        <loc>https://dope.security/post/tips-from-jedi-master-nico-popp</loc>
    </url>
    <url>
        <loc>https://dope.security/post/tips-from-mando-warrior-jason-merrick-svp-of-tenable</loc>
    </url>
    <url>
        <loc>https://dope.security/post/tips-from-sith-lord-javed-hasan-ceo-of-lineaje</loc>
    </url>
    <url>
        <loc>https://dope.security/post/top-10-url-filtering-tools</loc>
    </url>
    <url>
        <loc>https://dope.security/post/top-netskope-alternatives-2025-when-platform-is-more-than-you-need</loc>
    </url>
    <url>
        <loc>https://dope.security/post/top-zscaler-alternatives</loc>
    </url>
    <url>
        <loc>https://dope.security/post/top-zscaler-alternatives-2025-why-teams-are-switching</loc>
    </url>
    <url>
        <loc>https://dope.security/post/understanding-file-sharing-permissions-and-their-risks</loc>
    </url>
    <url>
        <loc>https://dope.security/post/upgrading-the-endpoint-authentication</loc>
    </url>
    <url>
        <loc>https://dope.security/post/vc-pe-firms-security</loc>
    </url>
    <url>
        <loc>https://dope.security/post/what-171k-real-world-web-requests-tell-us-about-2025-browsing-habits</loc>
    </url>
    <url>
        <loc>https://dope.security/post/what-is-a-secure-web-gateway-swg-89eb7b1da9a1</loc>
    </url>
    <url>
        <loc>https://dope.security/post/what-is-casb-neural</loc>
    </url>
    <url>
        <loc>https://dope.security/post/what-is-next-gen-swg</loc>
    </url>
    <url>
        <loc>https://dope.security/post/what-is-siem</loc>
    </url>
    <url>
        <loc>https://dope.security/post/what-is-the-difference-between-url-filtering-and-dns-filtering</loc>
    </url>
    <url>
        <loc>https://dope.security/post/what-is-url-filtering-bf8452ace722</loc>
    </url>
    <url>
        <loc>https://dope.security/post/your-employees-are-uploading-sensitive-files-to-ai-heres-how-to-stop-it</loc>
    </url>
    <url>
        <loc>https://dope.security/post/zscaler-competitors-zscaler-vs-netskope</loc>
    </url>
    <url>
        <loc>https://dope.security/post/zscaler-netskope-forcepoint-china</loc>
    </url>
    <url>
        <loc>https://dope.security/post/zscaler-review</loc>
    </url>
    <url>
        <loc>https://dope.security/post/zscaler-vs-cisco-umbrella</loc>
    </url>
    <url>
        <loc>https://dope.security/post/zscaler-vs-netskope-vs-dope-security-which-protects-users-fastest</loc>
    </url>
    <url>
        <loc>https://dope.security/post/zscaler-vs-netskope-which-sse-platform-is-right-for-your-team</loc>
    </url>
</urlset>