<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.passpointsecurity.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-01-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618497259178-6XJGK9GR6YAVBQL5L519/20140301_Trade-151_012-2.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1607694583486-2PQT0LQ193RL7MCB6DX4/20140228_Trade+151_0046.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1607694644871-IC85FNH781UNZSZEGHDR/Aro+Ha_0428.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580920910726-XD1CC627XH376RTXTI35/cyber.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan. - Cybersecurity</image:title>
      <image:caption>Passpoint can help your business and employees prepare and respond to cyber-attacks while meeting regulatory requirements.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580918880464-D4EK4NNARBZJBDHDNGS2/framework.png</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan. - Business Continuity</image:title>
      <image:caption>Passpoint can devise the framework you need to ensure your organization does business at an acceptable level of operation in the event of an adverse event.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575652029-DMVIHGT1Y2I3U2KYJA38/34698_438995997513_4685536_n.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575664350-OBFJPDR4L0QJUW3H2ZRF/14370187_1082271581888478_126857897081408692_n.png</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575679729-IHK2O6WIMPS9WT3E50K6/25289380_1396910947104116_1115504900462018465_n.png</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575736356-Z3ZVB4ICHX89GERZ31S9/47094766_2535863136430492_8998245519239151616_n.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575807963-EC580QYWJ0YZ12EX6Y5F/armhc.logo_.2017.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575882253-G11RGNL24XJE6TDUIOBK/clearhwlogo20.jpg</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575904907-7L443076S220U383T6NG/LakeOconeeAcademy.png</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575948821-25AII7V0BAKDWW2RGC37/logo-lightnetwork.png</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582575969084-5U2YC0TBU4U011CJ8AQ8/new-hc-logo.png</image:loc>
      <image:title>Passpoint Security | We can't predict, but we can plan.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/cybersecurity</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-01-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580923515839-659SSFYIHCRR57HKIO9F/network-pen-200-eye-07758.jpg</image:loc>
      <image:title>Cybersecurity - A.I. verified Penetration Testing</image:title>
      <image:caption>Introducing and industry first… A.I. verified Penetration Testing! Why just limit you testing experience to the knowledge base of your tester. Passpoint is now leveraging the power of A.I. to bring to market the most comprehensive and robust testing available…still delivered by a human! Our highly experienced team members simulate real-world attacks to identify threats and potential risks to your internal and external network infrastructure. Our Network Penetration Testing engagements are about reconnaissance and learning as much as we can about your network and how your information assets are protected. Our highly experienced team members simulate real-world attacks to identify threats and potential risks to your network infrastructure. Passpoint will uncover weaknesses in network configurations, exposed services, weaknesses in encryption, segmentation, authentication, and host isolation. At this time our team will have the ability to leverage A.I. to potentially find other means to exploit these vulnerabilities and if they feel these recommendations are valuable, they can put them into action. Because each organization’s network and needs are unique, our engagements are scoped to your requirements and mapped to best-practice penetration testing standards. Passpoint’s team of security experts will:  Uncover critical network vulnerabilities that exist on all networks, systems, and hosts through automated tools and real-world attacks Help you understand the level of risk for your organization through comprehensive reports and detailed findings Address positive findings and effective security measures your organization has in place Offer tailored remediation strategies</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580923547377-6G60TGO319538DT2711I/scan-network-photo-1487058792275-0ad4aaf24ca7.jpg</image:loc>
      <image:title>Cybersecurity - Vulnerability Scans</image:title>
      <image:caption>Stay one step ahead of hackers by checking to confirm your network and systems are protected and ensure your organization stays in compliance with security standards. Security is an ongoing process. Malicious hackers only need to find one unpatched vulnerability, but security teams must uncover all unpatched hardware and software flaws. In addition, many regulatory agencies require Internal and External Vulnerability Assessments to ensure your organization is in compliance with security standards. Systems are penetrated by outsiders, insiders and business partners, and the cost of a data breach can rapidly multiply. The sophistication of IT attacks is on the rise and the statistics are disturbing: 75% of breaches are executed within minutes of initial internal network access 92% of organizations are made aware of a breach via third-party notification In 54% of cases, it takes companies more than one month to become aware of a compromise 38% of organizations take longer than one week to respond to and mitigate a breach Protecting sensitive data and systems helps organizations avoid costly breaches, loss of intellectual property, business disruption and reputation damage. In the event of a security breach, lack of internal and external scanning could lead to a determination of negligence. Passpoint’s team of experts can help you stay one step ahead of malicious hackers by handling configuration, scanning, and reporting. Our technology will allow you to quickly and inexpensively check to confirm your network and systems are protected and will allow you to ensure your organization stays in compliance with security standards.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580923577291-2G8NLS2X5E5KA1AWY11U/assessment-photo-1533729064966-ab1bac752600.jpg</image:loc>
      <image:title>Cybersecurity - Cybersecurity Assessment</image:title>
      <image:caption>Our cybersecurity assessment will help minimize your organization’s security risks by evaluating existing security policies and plans, general security management processes, and network architecture diagrams. Passpoint offers a customized cyber security assessment to address your organization’s unique situation. This assessment will help minimize your organization’s security risks by evaluating existing security policies and plans, general security management processes, and network architecture diagrams. Each assessment includes: Review of information and documentation to better understand your program Perform vulnerability and penetration testing Summarized executive report, that includes prioritized findings and recommendations for remediation A summarized executive report that includes any found security risks, and recommendations for remediation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580923592137-76424T26R9XZT1IZHTZ6/phish.jpg</image:loc>
      <image:title>Cybersecurity - Phishing Campaigns</image:title>
      <image:caption>Phishing Campaigns are designed by Passpoint and intended to simulate a real-world phishing attack. Passpoint’s customized phishing campaigns will serve as a training opportunity to help you understand your organization’s added risks.  Phishing plays a large role in over 90% of security incidents. Our simulated Phishing Campaigns are designed to assess your employee’s ability to avoid being phished and improve your organizations overall security awareness. The Passpoint team will customize Phishing Campaigns that serve as a training opportunity to help you understand your organizations added risks. This process is conducted by using publicly available information about your company and then sending emails to your organization’s personnel to see if they click links or open files. The links may direct your employees to something such as a survey website or a “clone” of your website, where specific information is requested. The links could also lead to a site that hosts malware and attempts to automatically compromise your systems. The Phishing Campaigns are designed by Passpoint and intended to simulate a real-world phishing attack. All emails and links are sent by Passpoint and only the Passpoint team can use the information to leverage your organization’s computers.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580923604672-W0N8UXTU74OOIDJ2HRUH/it.jpg</image:loc>
      <image:title>Cybersecurity - Compliance Readiness Assessments / Gap Analysis</image:title>
      <image:caption>Are you ready for your audit? Whether it’s PCI, HIPAA, ISO27001, or an internal risk assessment let us work with you on conducting a readiness gap analysis against the framework that is pertinent to your business and clients. A readiness assessment is a baseline with remediation recommendations which ensures that your audit requirements are met efficiently and effectively. Our consultants conduct an in-depth review of requirements, prioritize findings, and develop a cogent remediation strategy.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580923435144-MSORCSW1Y2B11OSWCKFX/image-asset.jpeg</image:loc>
      <image:title>Cybersecurity - IT Policy and Standards Review</image:title>
      <image:caption>Passpoint consultants have deep security industry knowledge and will develop information security policies and standards and will conduct a thorough review of them annually. The policies and standards will also meet industry compliance requirements as well as organization information security program requirements.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580923640598-UK3RK8MZBUO30H8KKALA/technology-servers-server-159282.jpg</image:loc>
      <image:title>Cybersecurity - Network Infrastructure Assessments</image:title>
      <image:caption>Passpoint consultants have deep security industry knowledge and will develop information security policies and standards and will conduct a thorough review of them annually. The policies and standards will also meet industry compliance requirements as well as organization information security program requirements.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1607729693439-2VRR3SD0TKV8ZB75R9Z1/dark-web.png</image:loc>
      <image:title>Cybersecurity - Dark Web Monitoring</image:title>
      <image:caption>The threat to your business does not necessarily lie within the four walls of your business. Your employees are creating accounts on many different types of third-party websites. They’re using their work email addresses and often the same password, or same variation of a password, for these accounts. Once the third-party website is breached, cyber criminals are able to test passwords that they obtain on other, more dangerous websites.   Our service is designed to help organizations detect and mitigate cyber threats that leverage stolen email addresses and passwords.  We leverage a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other blackmarket sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1607729724056-7H06A7Y2XNMFYFDEFAKG/threathunting.png</image:loc>
      <image:title>Cybersecurity - Threat Hunting</image:title>
      <image:caption>The Passpoint Threat Hunt is a forensic-level inspection of your IT systems that provides visibility and awareness of your current threat state. We proactively hunt to identify active and dormant threats on endpoints and network egress points. The process reveals instances of theft of IP or sensitive data to determine whether you are, or have been, compromised. If active attacks are identified, our analysts will provide all the details and support needed for full system recovery, with minimal disruption to users.    Features  Gives an overview of your security posture Cyber security specialists complete a forensic-level inspection of your network Endpoint assessment completed by a software agent generating performance metadata Identifies unknown malware, persistent backdoors, PUPs and shadow software Identifies malicious executables, fileless malware, hijacked processes and lateral movement Flags security flaws and identifies past data leakage Detailed report highlights areas investigated and explains results Analysts supported by our own up-to-the-minute, constantly evolving intelligence Minimal disruption to IT department and users</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582740569541-3TZQH5L4FZZP7MFFGXES/Request-Info-Button.png</image:loc>
      <image:title>Cybersecurity</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/business-continuity</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-01-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580924460399-DELTT7IRPVNCPZTCUQKR/services-image-3.jpg</image:loc>
      <image:title>Business Continuity - Business Impact Analysis</image:title>
      <image:caption>Imagine running an IT company that hosts servers for over 200 clients and lightning strikes your office, causing a raging fire. This fire melts your cables, burns your hardware, and destroys your infrastructure beyond repair. This happened to a company in South Carolina. Due to smart business practices, this company had a Business Continuity Plan and Business Impact Analysis already in place. The company had moved client servers to a remote data center and stored continual backups. They moved staff to a temporary office but clients never experienced a disruption. For an IT company that hosts client servers and data, the destruction of your network infrastructure could cripple your business. The CEO stated that “If we didn’t take continuity of our operations seriously, we wouldn’t be in business right now.” Make sure you plan for the unpredictable. Let Passpoint’s experienced team help you devise the framework you need to ensure your organization does business at an acceptable level of operation in the event of a disaster or adverse event. The first step will be to conduct a Business Impact Analysis (BIA), which is the key component for any disaster recovery project.  Through the BIA, your organization will be able to identify the key technology, business processes, personnel, resources, and critical service providers and determine which systems are essential to the survival of the organization. The process of the BIA determines potential impacts, including financial and operational impacts of incidents and disasters that result in loss of facility, people, systems, and service providers. The BIA identifies interdependencies among information systems and processes. Also, it assesses major risks, and objectives in the event of a business disruption. You will understand recovery times and Recovery Time Objectives (RTO) for your organization, and Maximum Tolerable Period of Disruption (MTPD). The information acquired from the BIA identifies business recovery requirements, which are the basis for developing and implementing effective recovery strategies for your organization, and it sets the framework for developing the Business Continuity Plan. The BIA will define and prioritize recovery strategies and procedures and identify alternate strategies to maintain client services and business operations. Essentially, this analysis helps you look at your organization’s processes and determine which are most important, gives you insight into your business’s current capabilities and business needs, and uncovers how your organization would be impacted by a disaster.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580924305416-2WBAF1C4R938ZD8K1ARL/services-image-1+copy.jpg</image:loc>
      <image:title>Business Continuity - Business Continuity Strategy &amp; Planning</image:title>
      <image:caption>We partner with you to build robust business continuity strategies and plans outlining Incident Management Teams and their roles and responsibilities. The Incident Management and Business Continuity Plans focus on 4 key areas: Reduced workforce Loss of facilities Loss of IT Loss of key 3rd party vendors</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580924336172-QC4T5GEREQZFSXCVNL9T/services-image-2.jpg</image:loc>
      <image:title>Business Continuity - Table Top Exercises</image:title>
      <image:caption>There are multiple ways we can help you test and train on your plan. Tabletop exercises are the best way to validate your capabilities and uncover areas for improvement. Passpoint can create a custom tabletop for you to do on your own with your team, or we can facilitate it for you….your choice!</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580924379786-QDTKB60XFYVT3FYYXZUA/services-image-3.jpg</image:loc>
      <image:title>Business Continuity - Existing Business Continuity Program Review &amp; Gap Analysis</image:title>
      <image:caption>Passpoint will review your existing business continuity program, highlight non-conformities and provide direction on how to reasonably move forward to meet your business goals.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1580924411237-U1WISBF63GM3V1ZPM8FU/services-image-4+copy.jpg</image:loc>
      <image:title>Business Continuity - Annual Plan Maintenance &amp; Updates</image:title>
      <image:caption>Passpoint will assist in protecting your organization’s Business Continuity Program by providing periodic reviews, updates and recommended improvements to business continuity plans and the IT incident response recovery plan.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582740642628-CEQ4YHTK9XKSMSQ1SFIA/Request-Info-Button.png</image:loc>
      <image:title>Business Continuity</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-08</lastmod>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/ca585a41-8321-4e28-813a-2316bac8afc1/asv.jpg</image:loc>
      <image:title>About - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582740504547-7GBA8ULKLNKXDZGISKDX/Request-Info-Button.png</image:loc>
      <image:title>About</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/ptaas</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-01-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1581019950745-IYGVYYC5UQZGSGIO70WJ/image-asset.jpeg</image:loc>
      <image:title>A.I. verified PTaaS - What is A.I. verified PTaas?</image:title>
      <image:caption>Passpoint’s PTaaS is increasing the frequency in which companies are assessing their cybersecurity posture. PTaaS not only allows for more consistent visibility but offers an OpEx cost model vs. a CapEx cost model which allows a company better control of their monthly cashflow while maintaining regulatory compliance. Passpoint then uses the knowledge base of A.I. to ensure that we are considering all approaches to exploit vulnerabilities.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1581020095374-WUI8XWLDQOTVPRCXHL7S/image-asset.jpeg</image:loc>
      <image:title>A.I. verified PTaaS - Benefits</image:title>
      <image:caption>Allows for flexibility in services selection Meet regulatory requirements Gain continual insights on your security posture Ensure you are leveraging industry best practices on BCP and Cybersecurity Bundled discounts Pay monthly</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1581020268492-OYD0X8ZOZJM73G9084FH/image-asset.jpeg</image:loc>
      <image:title>A.I. verified PTaaS - How it works</image:title>
      <image:caption>A company chooses from a menu of services that they would like to have performed in a calendar year.  These services are then bundled together in a custom sequence chosen by the company.  Instead of paying for these services in a lump sum, the buyer benefits from bundled discounts and pays a monthly reoccurring fee to have the services delivered.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1581020425863-HS58BFA9IF6UAHVK23IX/image-asset.jpeg</image:loc>
      <image:title>A.I. verified PTaaS - Cybersecurity Services Offered</image:title>
      <image:caption>Choose from: A.I. verified Penetration Testing Vulnerability Scans Phishing Cyber Incident Response Plans Dark Web Monitoring Threat Hunting Policy/Procedure Creation and much more. Any service we offer can be included.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1581020487686-ODZ3W4HKKH7HKWZFLG8G/image-asset.jpeg</image:loc>
      <image:title>A.I. verified PTaaS - Business Continuity Services Offered</image:title>
      <image:caption>Choose from: BIA (Business Impact Analysis) BCP (Business Continuity Plan) Tabletop Exercises Gap Analysis Third Party DDQs Program Management (Ongoing Support)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1581020650751-6VNLHMXGXKEPO2Z03CCE/PTaaS-Presentation-7.jpg</image:loc>
      <image:title>A.I. verified PTaaS</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582740692235-APCIKO5X2YBKW337FAYN/Request-Info-Button.png</image:loc>
      <image:title>A.I. verified PTaaS</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/referral</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-08-29</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1607457150718-VO6CFK9MY5FTW8JU1KOF/ReferralProgram.jpg</image:loc>
      <image:title>Referral</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1607385761179-D1IZ4Z0I0M4CF9D3SO73/american-express-250-gift-card.jpg</image:loc>
      <image:title>Referral</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-25</lastmod>
  </url>
  <url>
    <loc>https://www.passpointsecurity.com/ransomware-impact-analysis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-01-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/759d17a1-c396-4ae3-962e-34b869f02262/Untitled-1.jpg</image:loc>
      <image:title>Ransomware Impact Analysis</image:title>
      <image:caption>Passpoint's Ransomware Impact Analysis (RIA) offers a secure means to simulate a ransomware infection within your organization's network. By installing a lightweight agent on 'Patient Zero' and employing the same Tools, Techniques, and Procedures (TTPs) utilized by real attackers, our RIA meticulously traverses the environment. Tracking the specific TTPs used provides invaluable insights to fortify your defenses against actual attacks. RIA conducts a comprehensive analysis, identifying factors that can minimize the likelihood of a ransomware attack and suggesting strategies to mitigate damage if such an event occurs, ensuring your organization is well-prepared and resilient.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/ad8af009-b562-4a35-a72e-d43dbc9c32a5/Untitled-2.jpg</image:loc>
      <image:title>Ransomware Impact Analysis - What’s Your Blast Radius?</image:title>
      <image:caption>Based on the attack path, our RIA gives you a detailed list of vulnerabilities and gaps that allows your team to focus resources and budget to close verified gaps. With its interactive reporting feature, our RIA provides your organization with a visual roadmap to remediate data separation, network segmentation, and user permissions, strengthening your security posture and hardening your environment against infection.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5e3adca7ff7ef11d35f16d84/1582740569541-3TZQH5L4FZZP7MFFGXES/Request-Info-Button.png</image:loc>
      <image:title>Ransomware Impact Analysis</image:title>
    </image:image>
  </url>
</urlset>

