<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://blog.enterprisemanagement.com/blog/knowledge-delivery-in-2013-imagination-is-more-important-than-knowledge</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/aMiracleOccurs1.jpg</image:loc><image:caption>aMiracleOccurs1</image:caption><image:title>aMiracleOccurs1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_KnowledgeDelivery2.jpg</image:loc><image:caption>emaBiContinuumKnowledgeDelivery2</image:caption><image:title>emaBiContinuumKnowledgeDelivery2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_BusinessAnalytics.jpg</image:loc><image:caption>emaBiContinuumBusinessAnalytics</image:caption><image:title>emaBiContinuumBusinessAnalytics</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/review-of-the-microsoft-surface-rt-a-story-of-what-could-have-been</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/storage-hypervisor-chart.png</image:loc><image:caption>storagehypervisorchart</image:caption><image:title>storagehypervisorchart</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/how-is-cloud-changing-the-face-of-it-service-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-LightCyber-125px.jpg</image:loc><image:caption>EMASponsoredByLightCyber125px</image:caption><image:title>EMASponsoredByLightCyber125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/from-ai-to-zero-trust</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-black-hat-2023-recap-1.jpg</image:loc><image:caption>emablackhat2023recap1</image:caption><image:title>emablackhat2023recap1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/decoding-cybersecurity-trends-for-2024.jpg</image:loc><image:caption>decodingcybersecuritytrendsfor2024</image:caption><image:title>decodingcybersecuritytrendsfor2024</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2023-12-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/thoughts-on-splunk-conf-2014</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Damballa-Bit94.jpg</image:loc><image:caption>DamballaBit94</image:caption><image:title>DamballaBit94</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/redefining-the-branch-office-with-sd-wan</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/optimizing-change-by-understanding-value</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBusinessAnalyticsPyramid.jpg</image:loc><image:caption>emaBusinessAnalyticsPyramid</image:caption><image:title>emaBusinessAnalyticsPyramid</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/redefining-ptaas</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/redefining-ptaas.jpg</image:loc><image:caption>redefiningptaas</image:caption><image:title>redefiningptaas</image:title></image:image><lastmod>2025-03-18</lastmod></url><url><loc>https://blog.enterprisemanagement.com/datastax-ready-for-next-generation-cloud-and-mobile-application-delivery</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/gears-3699316_1920%5B1%5D.jpg</image:loc><image:caption>gears369931619201</image:caption><image:title>gears369931619201</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/HASSO_SAPPHIRE.cropped.jpg</image:loc><image:caption>HASSOSAPPHIREcropped</image:caption><image:title>HASSOSAPPHIREcropped</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/convergence-data-blue.jpg</image:loc><image:caption>convergencedatablue</image:caption><image:title>convergencedatablue</image:title></image:image><lastmod>2019-01-30</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/office-365-to-cloud-or-not-to-cloud-that-is-the-question</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT1.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT1</image:caption><image:title>EMASponsoredBy125pxHEAT1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2017/06/07/optimizing-business-network-analytics</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/blurring-the-lines-across-traditional-boundaries-top-it-data-management-trends-of-2012</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-software-defined-future-of-the-wan</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/59300_EMA-SponsoredBy_HelpSystems.png</image:loc><image:caption>59300EMASponsoredByHelpSystems</image:caption><image:title>59300EMASponsoredByHelpSystems</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/openstack-thoughts-part-2-impact-on-vmware</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Enterprise-User-Multi-Device-Adoption1-300x142.png</image:loc><image:caption>EnterpriseUserMultiDeviceAdoption1300x142</image:caption><image:title>EnterpriseUserMultiDeviceAdoption1300x142</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/highlights-from-ibm-analyst-insights-2013-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/data-management-in-memory-could-be-the-mother-of-all-wisdom</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/iStock_000008963147XSmall.jpg</image:loc><image:caption>iStock000008963147XSmall</image:caption><image:title>iStock000008963147XSmall</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/aMiracleOccurs1.jpg</image:loc><image:caption>aMiracleOccurs1</image:caption><image:title>aMiracleOccurs1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dantwing/2015/11/25/practices-innovating-cloud-technologies-utilizing-public-private-hybrid-cloud</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px1</image:caption><image:title>EMASponsoredByHEAT125px1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture4.png</image:loc><image:caption>Picture4</image:caption><image:title>Picture4</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-122-proactive-vs.-reactive-cybersecurity</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/agentic-ai-black-hat.jpg</image:loc><image:caption>agenticaiblackhat</image:caption><image:title>agenticaiblackhat</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-09-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dennisdrogseth/2017/09/26/transforming-enduser-support</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/how-to-unleash-the-full-value-of-hybrid-cloud</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/prison-300x156.jpg</image:loc><image:caption>prison300x156</image:caption><image:title>prison300x156</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/burning-money-300x243.png</image:loc><image:caption>burningmoney300x243</image:caption><image:title>burningmoney300x243</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Mistake-300x169.jpg</image:loc><image:caption>Mistake300x169</image:caption><image:title>Mistake300x169</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-trends-predictions-2025</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-supply-chain.jpg</image:loc><image:caption>identitysupplychain</image:caption><image:title>identitysupplychain</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/opentext-world-2024-recap-02.jpg</image:loc><image:caption>opentextworld2024recap02</image:caption><image:title>opentextworld2024recap02</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-2025-trends.jpg</image:loc><image:caption>cybersecurity2025trends</image:caption><image:title>cybersecurity2025trends</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2024-12-20</lastmod></url><url><loc>https://blog.enterprisemanagement.com/davidmonahan/2017/01/09/truth-scope-endpoint-problem-enterprise</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/006b1_EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>006b1EMASponsoredByForescout125px</image:caption><image:title>006b1EMASponsoredByForescout125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-openai-dealbook-the-trillion-dollar-compute-economy</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/aws-outage.jpg</image:loc><image:caption>awsoutage</image:caption><image:title>awsoutage</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/the-openai-dealbook-2025.jpg</image:loc><image:caption>theopenaidealbook2025</image:caption><image:title>theopenaidealbook2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-11-04</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/building-the-path-to-mobile-bi</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Rainbow-300x199.jpg</image:loc><image:caption>Rainbow300x199</image:caption><image:title>Rainbow300x199</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/a-banner-year-highlighting-emas-2025-network-infrastructure-and-operations-research</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/network-source-of-truth-2025-large.jpg</image:loc><image:caption>networksourceoftruth2025large</image:caption><image:title>networksourceoftruth2025large</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI-network-ThinkstockPhotos-647837760.jpg</image:loc><image:caption>AInetworkThinkstockPhotos647837760</image:caption><image:title>AInetworkThinkstockPhotos647837760</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/enterprise-strategies-for-hybrid-multi-cloud-networks-2025-1.jpg</image:loc><image:caption>enterprisestrategiesforhybridmulticloudnetworks20251</image:caption><image:title>enterprisestrategiesforhybridmulticloudnetworks20251</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-at-30.jpg</image:loc><image:caption>emaat30</image:caption><image:title>emaat30</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/network-observability-2025.jpg</image:loc><image:caption>networkobservability2025</image:caption><image:title>networkobservability2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202025-11-25%20at%204.15.41%20PM.jpg</image:loc><image:caption>Screenshot20251125at41541PM</image:caption><image:title>Screenshot20251125at41541PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/from-scripts-to-platforms-2025.jpg</image:loc><image:caption>fromscriptstoplatforms2025</image:caption><image:title>fromscriptstoplatforms2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity%20trends%202026.jpg</image:loc><image:caption>cybersecuritytrends2026</image:caption><image:title>cybersecuritytrends2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/enterprises-embrace-ai-driven-wi-fi-2025.jpg</image:loc><image:caption>enterprisesembraceaidrivenwifi2025</image:caption><image:title>enterprisesembraceaidrivenwifi2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cloud-network-traffic-data-2025.jpg</image:loc><image:caption>cloudnetworktrafficdata2025</image:caption><image:title>cloudnetworktrafficdata2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/readying-enterprise-networks-for-ai-2025.jpg</image:loc><image:caption>readyingenterprisenetworksforai2025</image:caption><image:title>readyingenterprisenetworksforai2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-supply-chain-attacks</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><lastmod>2025-06-12</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/extrahop-addy-applies-cloud-based-machine-learning-to-network-data</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-software-defined-datacenter-part-4-of-4-where-we-are-today</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/iStock_000019163078XSmall-150x150.jpg</image:loc><image:caption>iStock000019163078XSmall150x150</image:caption><image:title>iStock000019163078XSmall150x150</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/iStock_000014047443XSmall-150x150.jpg</image:loc><image:caption>iStock000014047443XSmall150x150</image:caption><image:title>iStock000014047443XSmall150x150</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/iStock_000008963147XSmall.jpg</image:loc><image:caption>iStock000008963147XSmall</image:caption><image:title>iStock000008963147XSmall</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2015/05/08/sdn-network-management-onug</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/graphiant-a-vendor-to-watch</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-rsac-2022-cybersecurity-conferences.jpg</image:loc><image:caption>emarsac2022cybersecurityconferences</image:caption><image:title>emarsac2022cybersecurityconferences</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/VtW_Badge-Graphiant_0822-1.png</image:loc><image:caption>VtWBadgeGraphiant08221</image:caption><image:title>VtWBadgeGraphiant08221</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/VtW_Badge-Graphiant_0822.png</image:loc><image:caption>VtWBadgeGraphiant0822</image:caption><image:title>VtWBadgeGraphiant0822</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-a-valentines-day-wakeup-call-2.jpg</image:loc><image:caption>emaavalentinesdaywakeupcall2</image:caption><image:title>emaavalentinesdaywakeupcall2</image:title></image:image><lastmod>2022-09-08</lastmod></url><url><loc>https://blog.enterprisemanagement.com/q-day-just-got-way-more-real</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/agentic-ddi.jpg</image:loc><image:caption>agenticddi</image:caption><image:title>agenticddi</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/quantum-computing.jpg</image:loc><image:caption>quantumcomputing</image:caption><image:title>quantumcomputing</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2026-03-31</lastmod></url><url><loc>https://blog.enterprisemanagement.com/using-google-gemini-to-analyze-trends-in-the-rsa-conference-2024</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsa-preview-2024-1.jpg</image:loc><image:caption>rsapreview20241</image:caption><image:title>rsapreview20241</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/RSA-Blog-Chart-03.jpg</image:loc><image:caption>RSABlogChart03</image:caption><image:title>RSABlogChart03</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-05-14%20at%204.48.09%20PM.png</image:loc><image:caption>Screenshot20240514at44809PM</image:caption><image:title>Screenshot20240514at44809PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/RSA-Blog-Chart-02.jpg</image:loc><image:caption>RSABlogChart02</image:caption><image:title>RSABlogChart02</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/RSA-Blog-Chart-01-1.jpg</image:loc><image:caption>RSABlogChart011</image:caption><image:title>RSABlogChart011</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-cybersecurity-awesomeness-podcast-logo-2x2.png</image:loc><image:caption>emacybersecurityawesomenesspodcastlogo2x2</image:caption><image:title>emacybersecurityawesomenesspodcastlogo2x2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2024-05-03</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dynatrace-perform-2024</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-02-20%20at%201.51.05%20PM.png</image:loc><image:caption>Screenshot20240220at15105PM</image:caption><image:title>Screenshot20240220at15105PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/passwordless%20authentication.jpeg</image:loc><image:caption>passwordlessauthentication</image:caption><image:title>passwordlessauthentication</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/dynatrace-perform-2024.jpg</image:loc><image:caption>dynatraceperform2024</image:caption><image:title>dynatraceperform2024</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2024-03-15</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/network-managers-should-be-monitoring-servers</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/26d2d_EMA-SponsoredBy_HelpSystems.png</image:loc><image:caption>26d2dEMASponsoredByHelpSystems</image:caption><image:title>26d2dEMASponsoredByHelpSystems</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-greatest-risk-to-the-success-of-cloud-saas</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/return-on-investment-roi-of-data-science-as-a-service</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/network-operations-and-analytics-from-ca-technologies-has-won-the-ema-innovator-award</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/avoiding-enterprise-mobile-management-a-futile-exercise-in-procrastination</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT-2.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT2</image:caption><image:title>EMASponsoredBy125pxHEAT2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-cmdbcms-market-in-transition</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-113-on-premise-vs-cloud-vs-saas</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/iran-conflict-2025.jpg</image:loc><image:caption>iranconflict2025</image:caption><image:title>iranconflict2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><lastmod>2025-06-23</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/top-5-reasons-custom-scripts-are-putting-your-business-at-risk</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-3.png</image:loc><image:caption>EMASponsoredByHelpSystems3</image:caption><image:title>EMASponsoredByHelpSystems3</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/what-big-data-is-not</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/HDE-300x235.jpg</image:loc><image:caption>HDE300x235</image:caption><image:title>HDE300x235</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/security-awareness-tax-scams-2020</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ThinkstockPhotos-518427664.jpg</image:loc><image:caption>ThinkstockPhotos518427664</image:caption><image:title>ThinkstockPhotos518427664</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/calculator-1680905_960_720.jpg</image:loc><image:caption>calculator1680905960720</image:caption><image:title>calculator1680905960720</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300black-and-silver-laptop-computer-on-white-table-3787603-1.jpg</image:loc><image:caption>300blackandsilverlaptopcomputeronwhitetable37876031</image:caption><image:title>300blackandsilverlaptopcomputeronwhitetable37876031</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2020-03-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/what-is-advanced-network-analytics-cutting-through-the-hype</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMA-blog-header-bg-2018.jpg</image:loc><image:caption>EMAblogheaderbg2018</image:caption><image:title>EMAblogheaderbg2018</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/sphere-network-dots-connections-ThinkstockPhotos-2.jpg</image:loc><image:caption>spherenetworkdotsconnectionsThinkstockPhotos2</image:caption><image:title>spherenetworkdotsconnectionsThinkstockPhotos2</image:title></image:image><lastmod>2018-05-15</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/dell-secureworks-and-risk-io-team-up-to-deliver-a-better-kind-of-vulnerability-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/rsa-conference-recap</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsac-2024-tales-from-the-floor.jpg</image:loc><image:caption>rsac2024talesfromthefloor</image:caption><image:title>rsac2024talesfromthefloor</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsac-2024.jpg</image:loc><image:caption>rsac2024</image:caption><image:title>rsac2024</image:title></image:image><lastmod>2024-05-21</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/process-dialog-and-workflow-a-formula-for-interconnection-and-automation</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>EMASponsoredByHEAT125px</image:caption><image:title>EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/acronym-acrobatics-relating-uem-to-uem</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/burning-money-300x243.png</image:loc><image:caption>burningmoney300x243</image:caption><image:title>burningmoney300x243</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/future-proofing-your-edr-solution</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/1E-image.png</image:loc><image:caption>1Eimage</image:caption><image:title>1Eimage</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/whale-2.jpg</image:loc><image:caption>whale2</image:caption><image:title>whale2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ciscolive-us-logo.png</image:loc><image:caption>ciscoliveuslogo</image:caption><image:title>ciscoliveuslogo</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-06-20</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/dells-clean-slate-approach-to-enterprise-it</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Enterprise-User-Multi-Device-Adoption1-300x142.png</image:loc><image:caption>EnterpriseUserMultiDeviceAdoption1300x142</image:caption><image:title>EnterpriseUserMultiDeviceAdoption1300x142</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Dell-Portfolio.png</image:loc><image:caption>DellPortfolio</image:caption><image:title>DellPortfolio</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/war-of-the-stacks-openstack-vs-cloudstack-vs-vcloud-vs-amazon-ec2-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/a6f68_EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>a6f68EMASponsoredByHEAT125px</image:caption><image:title>a6f68EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-114-nation-state-cyber-attacks</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/iran-conflict-2025.jpg</image:loc><image:caption>iranconflict2025</image:caption><image:title>iranconflict2025</image:title></image:image><lastmod>2025-06-30</lastmod></url><url><loc>https://blog.enterprisemanagement.com/enterprises-must-adapt-network-performance-management-to-next-generation-technology</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/bullseye%20computer%20iStock_000018640414XSmall.jpg</image:loc><image:caption>bullseyecomputeriStock000018640414XSmall</image:caption><image:title>bullseyecomputeriStock000018640414XSmall</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMAIL%20banners/EMA-NetManMegatrends-0418-email-banner.jpg</image:loc><image:caption>EMANetManMegatrends0418emailbanner</image:caption><image:title>EMANetManMegatrends0418emailbanner</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_213592256%20(1)%20-%20Copy-1.jpeg</image:loc><image:caption>AdobeStock2135922561Copy1</image:caption><image:title>AdobeStock2135922561Copy1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2019-10-09</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-desperate-need-for-accuracy-and-efficiency-in-security-for-detecting-network-intruders-and-other-threat-actors-quickly</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems1.png</image:loc><image:caption>EMASponsoredByHelpSystems1</image:caption><image:title>EMASponsoredByHelpSystems1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems2.png</image:loc><image:caption>EMASponsoredByHelpSystems2</image:caption><image:title>EMASponsoredByHelpSystems2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-trends-to-consider-in-2026</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI%20and%20cybersecurity.jpg</image:loc><image:caption>AIandcybersecurity</image:caption><image:title>AIandcybersecurity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity%20trends%202026.jpg</image:loc><image:caption>cybersecuritytrends2026</image:caption><image:title>cybersecuritytrends2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI-network-ThinkstockPhotos-647837760.jpg</image:loc><image:caption>AInetworkThinkstockPhotos647837760</image:caption><image:title>AInetworkThinkstockPhotos647837760</image:title></image:image><lastmod>2026-01-02</lastmod></url><url><loc>https://blog.enterprisemanagement.com/three-opportunities-to-create-positive-experiences-with-consumer-iam</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/kisspng-logo-akamai-technologies-internet-content-delivery-5c3286d0dfc856.0881538215468151849166.png</image:loc><image:caption>kisspnglogoakamaitechnologiesinternetcontentdelivery5c3286d0dfc8560881538215468151849166</image:caption><image:title>kisspnglogoakamaitechnologiesinternetcontentdelivery5c3286d0dfc8560881538215468151849166</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_249843417.jpeg</image:loc><image:caption>AdobeStock249843417</image:caption><image:title>AdobeStock249843417</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_328712853-4.jpeg</image:loc><image:caption>AdobeStock3287128534</image:caption><image:title>AdobeStock3287128534</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_355254981.jpeg</image:loc><image:caption>AdobeStock355254981</image:caption><image:title>AdobeStock355254981</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UAW%20Logos2.jpg</image:loc><image:caption>UAWLogos2</image:caption><image:title>UAWLogos2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/IBM.png</image:loc><image:caption>IBM</image:caption><image:title>IBM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_284438272.jpeg</image:loc><image:caption>AdobeStock284438272</image:caption><image:title>AdobeStock284438272</image:title></image:image><lastmod>2020-09-10</lastmod></url><url><loc>https://blog.enterprisemanagement.com/is-2026-the-year-we-finally-master-zero-trust-or-the-year-of-agentic-data-breaches</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/redefining-modern-service-management-2025.jpg</image:loc><image:caption>redefiningmodernservicemanagement2025</image:caption><image:title>redefiningmodernservicemanagement2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI%20and%20cybersecurity.jpg</image:loc><image:caption>AIandcybersecurity</image:caption><image:title>AIandcybersecurity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity%20trends%202026.jpg</image:loc><image:caption>cybersecuritytrends2026</image:caption><image:title>cybersecuritytrends2026</image:title></image:image><lastmod>2025-12-23</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-111-penetration-testing</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2025-06-18</lastmod></url><url><loc>https://blog.enterprisemanagement.com/aviator-soars-one-year-in-at-opentext-world-2024</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/opentext-world-2024-recap-02.jpg</image:loc><image:caption>opentextworld2024recap02</image:caption><image:title>opentextworld2024recap02</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-2025-trends.jpg</image:loc><image:caption>cybersecurity2025trends</image:caption><image:title>cybersecurity2025trends</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-week.jpg</image:loc><image:caption>identityweek</image:caption><image:title>identityweek</image:title></image:image><lastmod>2024-12-06</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/prioritizing-workloads-deciding-whats-hot-and-whats-not</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBusinessAnalyticsPyramid.jpg</image:loc><image:caption>emaBusinessAnalyticsPyramid</image:caption><image:title>emaBusinessAnalyticsPyramid</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/orchestrating-a-symphony-of-application-automation</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-2.png</image:loc><image:caption>EMASponsoredByHelpSystems2</image:caption><image:title>EMASponsoredByHelpSystems2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2017/07/26/internet-drive-network-management-evolution</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/software-defined-storage-why-customers-should-care-part-1-of-2-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-uk-iphone-privacy-issues</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-03-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ema-research-shows-that-cyber-security-is-achieving-executive-visibility-in-a-big-way</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/C-Level-Finacial-backing-of-security-projects.png</image:loc><image:caption>CLevelFinacialbackingofsecurityprojects</image:caption><image:title>CLevelFinacialbackingofsecurityprojects</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/tableau-sets-the-tone-for-business-intelligence-2019</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/gears-3699316_1920%5B1%5D.jpg</image:loc><image:caption>gears369931619201</image:caption><image:title>gears369931619201</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/marcbenioff.jpg</image:loc><image:caption>marcbenioff</image:caption><image:title>marcbenioff</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/Tableau_Conference_2_700x400_0.png</image:loc><image:caption>TableauConference2700x4000</image:caption><image:title>TableauConference2700x4000</image:title></image:image><lastmod>2018-11-07</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2017/02/10/cisco-introduces-digital-building-catalyst-switches-iot</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/b7aa8_foosball.png</image:loc><image:caption>b7aa8foosball</image:caption><image:title>b7aa8foosball</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/fbi-warns-of-coronavirus-scams</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/unnamed.png</image:loc><image:caption>unnamed</image:caption><image:title>unnamed</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/SecureVideoConferencing.jpg</image:loc><image:caption>SecureVideoConferencing</image:caption><image:title>SecureVideoConferencing</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Understanding%20Cloud%20Market%20Share%20copy.jpg</image:loc><image:caption>UnderstandingCloudMarketSharecopy</image:caption><image:title>UnderstandingCloudMarketSharecopy</image:title></image:image><lastmod>2020-03-23</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/machine-learning-artificial-intelligence-promised-land-lowering-opex-decreasing-operational-risk-optimally-supporting-business-goals</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/change-management-the-big-picture</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Kaseya-125px.jpg</image:loc><image:caption>EMASponsoredByKaseya125px</image:caption><image:title>EMASponsoredByKaseya125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/advanced-operational-analytics-aoa-transformative-use-cases-from-ema-research</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/rapid-evolution-openstack-is-growing-up-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/war-of-the-stacks-openstack-vs-cloudstack-vs-vcloud-vs-amazon-ec2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/how-to-identify-the-ideal-network-automation-solution</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/red%20hat%20thumb.png</image:loc><image:caption>redhatthumb</image:caption><image:title>redhatthumb</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-cyber-security-cat-mouse.jpg</image:loc><image:caption>emacybersecuritycatmouse</image:caption><image:title>emacybersecuritycatmouse</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-cyber-security-ukraine.jpg</image:loc><image:caption>emacybersecurityukraine</image:caption><image:title>emacybersecurityukraine</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2022-04-27</lastmod></url><url><loc>https://blog.enterprisemanagement.com/not-so-quiet-on-the-cyber-front-why-your-organization-is-still-a-target</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/red%20hat%20thumb.png</image:loc><image:caption>redhatthumb</image:caption><image:title>redhatthumb</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo-2.jpg</image:loc><image:caption>AxoniusLogo2</image:caption><image:title>AxoniusLogo2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-cyber-security-ukraine.jpg</image:loc><image:caption>emacybersecurityukraine</image:caption><image:title>emacybersecurityukraine</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://blog.enterprisemanagement.com/why-technology-resiliency-isnt-optional-anymore</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/the-openai-dealbook-2025.jpg</image:loc><image:caption>theopenaidealbook2025</image:caption><image:title>theopenaidealbook2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/aws-outage.jpg</image:loc><image:caption>awsoutage</image:caption><image:title>awsoutage</image:title></image:image><lastmod>2025-10-21</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/recent-surveillance-revelations-part-2-what-can-we-do</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/top-5-reasons-it-administrators-are-working-too-hard-managing-endpoints</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/sysdig-overview2-300x192.png</image:loc><image:caption>sysdigoverview2300x192</image:caption><image:title>sysdigoverview2300x192</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px-2.jpg</image:loc><image:caption>EMASponsoredByHEAT125px2</image:caption><image:title>EMASponsoredByHEAT125px2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/business-intelligence-as-you-want-it</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-triple-threat-of-2026-why-your-ai-workforce-is-your-biggest-security-blind-spot</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-at-30.jpg</image:loc><image:caption>emaat30</image:caption><image:title>emaat30</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ai-native-triple-threat.jpg</image:loc><image:caption>ainativetriplethreat</image:caption><image:title>ainativetriplethreat</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/scammer-emailed-me-his-source-code.jpg</image:loc><image:caption>scammeremailedmehissourcecode</image:caption><image:title>scammeremailedmehissourcecode</image:title></image:image><lastmod>2026-01-19</lastmod></url><url><loc>https://blog.enterprisemanagement.com/entrants-in-the-unified-analytics-warehouse-race</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_355254981.jpeg</image:loc><image:caption>AdobeStock355254981</image:caption><image:title>AdobeStock355254981</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UAW%20Logos2.jpg</image:loc><image:caption>UAWLogos2</image:caption><image:title>UAWLogos2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/warehouse.modern.175.jpg</image:loc><image:caption>warehousemodern175</image:caption><image:title>warehousemodern175</image:title></image:image><lastmod>2020-10-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/public-clouds-are-disrupting-enterprise-network-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/whale-2.jpg</image:loc><image:caption>whale2</image:caption><image:title>whale2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/Cloud_building.jpg</image:loc><image:caption>Cloudbuilding</image:caption><image:title>Cloudbuilding</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Colorful-Nebulae.jpg</image:loc><image:caption>ColorfulNebulae</image:caption><image:title>ColorfulNebulae</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-09-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/bigid-unveils-bigid-next</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-02-24</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/contrarian-accelerators</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/business-analytics-in-2013-a-model-is-useful-if-</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_DataMgmt.jpg</image:loc><image:caption>emaBiContinuumDataMgmt</image:caption><image:title>emaBiContinuumDataMgmt</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_KnowledgeDelivery2.jpg</image:loc><image:caption>emaBiContinuumKnowledgeDelivery2</image:caption><image:title>emaBiContinuumKnowledgeDelivery2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBusinessAnalyticsPyramid.jpg</image:loc><image:caption>emaBusinessAnalyticsPyramid</image:caption><image:title>emaBusinessAnalyticsPyramid</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_BusinessAnalytics.jpg</image:loc><image:caption>emaBiContinuumBusinessAnalytics</image:caption><image:title>emaBiContinuumBusinessAnalytics</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-115-the-clickbait-news-cycle</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-07-07</lastmod></url><url><loc>https://blog.enterprisemanagement.com/sap-set-to-revolutionize-cloud-intelligence-for-business-professionals</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/convergence-data-blue.jpg</image:loc><image:caption>convergencedatablue</image:caption><image:title>convergencedatablue</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/HASSO_SAPPHIRE.jpg</image:loc><image:caption>HASSOSAPPHIRE</image:caption><image:title>HASSOSAPPHIRE</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/HASSO_SAPPHIRE.cropped.jpg</image:loc><image:caption>HASSOSAPPHIREcropped</image:caption><image:title>HASSOSAPPHIREcropped</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/bullseye%20computer%20iStock_000018640414XSmall.jpg</image:loc><image:caption>bullseyecomputeriStock000018640414XSmall</image:caption><image:title>bullseyecomputeriStock000018640414XSmall</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2019-05-23</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/why-optimizing-your-cloud-service-providers-is-still-an-industry-work-in-progress</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/a-new-analyst-on-the-block</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-open-networking-foundations-new-direction-we-live-in-a-post-openflow-world</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/is-there-a-nosql-identity-crisis</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/how-to-manage-your-it-ecosystem-or-itil-v7</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/graph-databases-and-their-potential-to-transform-how-we-capture-interdependencies</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-deepseek-ai</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-02-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ema-research-enabling-enterprise-it-management-to-optimally-support-big-data-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/viva-la-mobile-revolution</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Dentrix-Mobile-300x227.jpg</image:loc><image:caption>DentrixMobile300x227</image:caption><image:title>DentrixMobile300x227</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/begin-with-end-in-mind-for-big-data-analytics-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/rsac-2022-closing-thoughts-0</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-it-nation-secure-conference-recap.jpg</image:loc><image:caption>emaitnationsecureconferencerecap</image:caption><image:title>emaitnationsecureconferencerecap</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/SW%20Day.jpg</image:loc><image:caption>SWDay</image:caption><image:title>SWDay</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity_twitter.jpg</image:loc><image:caption>cybersecuritytwitter</image:caption><image:title>cybersecuritytwitter</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2023-05-08</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cmdb-is-alive-and-on-the-rise</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-black-hat-2023-recap.jpg</image:loc><image:caption>emablackhat2023recap</image:caption><image:title>emablackhat2023recap</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/CMDB.jpeg</image:loc><image:caption>CMDB</image:caption><image:title>CMDB</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Benefits%20of%20CMDB.png</image:loc><image:caption>BenefitsofCMDB</image:caption><image:title>BenefitsofCMDB</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Data%20deconding.jpeg</image:loc><image:caption>Datadeconding</image:caption><image:title>Datadeconding</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Valerie%20OConnell.jpg</image:loc><image:caption>ValerieOConnell</image:caption><image:title>ValerieOConnell</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2023-08-21</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/clouds-iron-fist</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/vmware-and-openstack-a-marriage-made-in-heaven</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/burning-money-300x243.png</image:loc><image:caption>burningmoney300x243</image:caption><image:title>burningmoney300x243</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/software-defined-storage-why-customers-should-care-part-1-of-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/SDDC-Sponsors.png</image:loc><image:caption>SDDCSponsors</image:caption><image:title>SDDCSponsors</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/iot-devices-in-the-network-can-you-find-them</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>EMASponsoredByForescout125px</image:caption><image:title>EMASponsoredByForescout125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-cisa-and-dhs-priorities</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-supply-chain.jpg</image:loc><image:caption>identitysupplychain</image:caption><image:title>identitysupplychain</image:title></image:image><lastmod>2025-01-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/five-key-identity-governance-features-that-your-identity-and-access-management-solution-does-not-support</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/DatSec.png</image:loc><image:caption>DatSec</image:caption><image:title>DatSec</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Ivanti.png</image:loc><image:caption>Ivanti</image:caption><image:title>Ivanti</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_261806448.jpeg</image:loc><image:caption>AdobeStock261806448</image:caption><image:title>AdobeStock261806448</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/F5%20AWS%20small-2.jpg</image:loc><image:caption>F5AWSsmall2</image:caption><image:title>F5AWSsmall2</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://blog.enterprisemanagement.com/identity-supply-chain</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-supply-chain-03.jpg</image:loc><image:caption>identitysupplychain03</image:caption><image:title>identitysupplychain03</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-2025-trends.jpg</image:loc><image:caption>cybersecurity2025trends</image:caption><image:title>cybersecurity2025trends</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-supply-chain-01.jpg</image:loc><image:caption>identitysupplychain01</image:caption><image:title>identitysupplychain01</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-supply-chain-04.jpg</image:loc><image:caption>identitysupplychain04</image:caption><image:title>identitysupplychain04</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-supply-chain.jpg</image:loc><image:caption>identitysupplychain</image:caption><image:title>identitysupplychain</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-supply-chain-02.jpg</image:loc><image:caption>identitysupplychain02</image:caption><image:title>identitysupplychain02</image:title></image:image><lastmod>2025-01-06</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/big-data-and-the-data-driven-enterprise</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/65f91_2015-HDE-300x262.jpg</image:loc><image:caption>65f912015HDE300x262</image:caption><image:title>65f912015HDE300x262</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/fd569_EMA-HDE-2000x1000px-300x150.jpg</image:loc><image:caption>fd569EMAHDE2000x1000px300x150</image:caption><image:title>fd569EMAHDE2000x1000px300x150</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/points-of-integration</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/corporate-data-return-on-investment</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/who-owns-user-and-customer-experience-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/570e2_emaBiContinuum_KnowledgeDelivery2-300x93.jpg</image:loc><image:caption>570e2emaBiContinuumKnowledgeDelivery2300x93</image:caption><image:title>570e2emaBiContinuumKnowledgeDelivery2300x93</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/it-nation-secure-conference-highlights</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-it-nation-secure-conference-recap.jpg</image:loc><image:caption>emaitnationsecureconferencerecap</image:caption><image:title>emaitnationsecureconferencerecap</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-black-hat-2023-recap.jpg</image:loc><image:caption>emablackhat2023recap</image:caption><image:title>emablackhat2023recap</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity_twitter.jpg</image:loc><image:caption>cybersecuritytwitter</image:caption><image:title>cybersecuritytwitter</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2023-06-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/netops-teams-consolidate-tools-but-sprawl-persists</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsac-2024-tales-from-the-floor.jpg</image:loc><image:caption>rsac2024talesfromthefloor</image:caption><image:title>rsac2024talesfromthefloor</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-05-14%20at%204.34.49%20PM.png</image:loc><image:caption>Screenshot20240514at43449PM</image:caption><image:title>Screenshot20240514at43449PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-05-14%20at%204.48.09%20PM.png</image:loc><image:caption>Screenshot20240514at44809PM</image:caption><image:title>Screenshot20240514at44809PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsa-preview-2024-1.jpg</image:loc><image:caption>rsapreview20241</image:caption><image:title>rsapreview20241</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-05-14%20at%204.48.16%20PM.png</image:loc><image:caption>Screenshot20240514at44816PM</image:caption><image:title>Screenshot20240514at44816PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2024-05-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/key-takeaways-from-rsac-2026</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/key-takeaways-from-rsac-2026.jpg</image:loc><image:caption>keytakeawaysfromrsac2026</image:caption><image:title>keytakeawaysfromrsac2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ai-trust.jpg</image:loc><image:caption>aitrust</image:caption><image:title>aitrust</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2026-03-27</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/workload-automation-trends-and-predictions-for-2012</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/effective-security-requires-a-change-in-mindset-and-the-protection-paradigm</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-LightCyber-125px.jpg</image:loc><image:caption>EMASponsoredByLightCyber125px</image:caption><image:title>EMASponsoredByLightCyber125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/how-knoa-software-user-experience-management-can-optimize-rpa-for-value</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/human-592734_1920.jpg</image:loc><image:caption>human5927341920</image:caption><image:title>human5927341920</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/User%20Experience%20Management.jpg</image:loc><image:caption>UserExperienceManagement</image:caption><image:title>UserExperienceManagement</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/SecureVideoConferencing.jpg</image:loc><image:caption>SecureVideoConferencing</image:caption><image:title>SecureVideoConferencing</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2020-04-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ema-research-enabling-enterprise-it-management-to-optimally-support-big-data</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/SDDC-Sponsors.png</image:loc><image:caption>SDDCSponsors</image:caption><image:title>SDDCSponsors</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/automation-is-key-to-staying-in-the-drivers-seat-of-your-data-driven-strategy</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems.png</image:loc><image:caption>EMASponsoredByHelpSystems</image:caption><image:title>EMASponsoredByHelpSystems</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture5-1024x425.jpg</image:loc><image:caption>Picture51024x425</image:caption><image:title>Picture51024x425</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture1.jpg</image:loc><image:caption>Picture1</image:caption><image:title>Picture1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture2.jpg</image:loc><image:caption>Picture2</image:caption><image:title>Picture2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture3.jpg</image:loc><image:caption>Picture3</image:caption><image:title>Picture3</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/bom-dia-views-from-5430ft-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/are-features-king-when-buying-an-it-management-tool-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/improving-vulnerability-management-with-cybersecurity-asset-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/gluware%20featured.png</image:loc><image:caption>gluwarefeatured</image:caption><image:title>gluwarefeatured</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo.jpg</image:loc><image:caption>AxoniusLogo</image:caption><image:title>AxoniusLogo</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo-1.jpg</image:loc><image:caption>AxoniusLogo1</image:caption><image:title>AxoniusLogo1</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/developing-an-information-management-strategy-within-the-ema-hybrid-data-ecosystem</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/2015-HDE-300x262.jpg</image:loc><image:caption>2015HDE300x262</image:caption><image:title>2015HDE300x262</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px_Attunity.jpg</image:loc><image:caption>EMASponsoredBy125pxAttunity</image:caption><image:title>EMASponsoredBy125pxAttunity</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/interconnect-2017-showing-off-a-whole-new-ibm</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/b7aa8_foosball.png</image:loc><image:caption>b7aa8foosball</image:caption><image:title>b7aa8foosball</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/evanquinn/2014/01/22/billion-reasons-sap-leads</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2015/08/28/know-when-its-time-to-replace-open-source-and-freeware-infrastructure-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/black-hat-europe-2023</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/decoding-cybersecurity-trends-for-2024.jpg</image:loc><image:caption>decodingcybersecuritytrendsfor2024</image:caption><image:title>decodingcybersecuritytrendsfor2024</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-black-hat-2023-recap-1.jpg</image:loc><image:caption>emablackhat2023recap1</image:caption><image:title>emablackhat2023recap1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Data%20deconding.jpeg</image:loc><image:caption>Datadeconding</image:caption><image:title>Datadeconding</image:title></image:image><lastmod>2023-12-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/f5-aws-integration-podcast</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_261806448.jpeg</image:loc><image:caption>AdobeStock261806448</image:caption><image:title>AdobeStock261806448</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/F5%20AWS%20small-1.jpg</image:loc><image:caption>F5AWSsmall1</image:caption><image:title>F5AWSsmall1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/F5%20AWS%20small-2.jpg</image:loc><image:caption>F5AWSsmall2</image:caption><image:title>F5AWSsmall2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-emergence-of-the-unified-analytics-warehouse</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_353678393%20-%20Copy.jpeg</image:loc><image:caption>AdobeStock353678393Copy</image:caption><image:title>AdobeStock353678393Copy</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/warehouse.modern.175.jpg</image:loc><image:caption>warehousemodern175</image:caption><image:title>warehousemodern175</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/network-3443547_640.jpg</image:loc><image:caption>network3443547640</image:caption><image:title>network3443547640</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UAW%20Diagram%20FINALtoLAYOUT.png</image:loc><image:caption>UAWDiagramFINALtoLAYOUT</image:caption><image:title>UAWDiagramFINALtoLAYOUT</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2020-08-21</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-requirements-for-a-unified-analytics-warehouse</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/network-3443547_640.jpg</image:loc><image:caption>network3443547640</image:caption><image:title>network3443547640</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UAW%20Diagram%20FINALtoLAYOUT.png</image:loc><image:caption>UAWDiagramFINALtoLAYOUT</image:caption><image:title>UAWDiagramFINALtoLAYOUT</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/warehouse.modern.175.jpg</image:loc><image:caption>warehousemodern175</image:caption><image:title>warehousemodern175</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UAW%20Logos2.jpg</image:loc><image:caption>UAWLogos2</image:caption><image:title>UAWLogos2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2020-08-21</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/itsm-futures-a-closer-look-at-mobile-and-unified-endpoint-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Kaseya-125px.jpg</image:loc><image:caption>EMASponsoredByKaseya125px</image:caption><image:title>EMASponsoredByKaseya125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT1.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT1</image:caption><image:title>EMASponsoredBy125pxHEAT1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-asteriondb</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-01-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/software-defined-storage-the-vendor-landscape-part-2-of-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/podcast-discussing-big-data-integration-and-security</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/fd569_emaBiContinuum_DataMgmt-300x93.jpg</image:loc><image:caption>fd569emaBiContinuumDataMgmt300x93</image:caption><image:title>fd569emaBiContinuumDataMgmt300x93</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/65f91_2015-HDE-300x262.jpg</image:loc><image:caption>65f912015HDE300x262</image:caption><image:title>65f912015HDE300x262</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-taxes-tariffs</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/signs-vs-microsoft-teams.jpg</image:loc><image:caption>signsvsmicrosoftteams</image:caption><image:title>signsvsmicrosoftteams</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-04-07</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/best-practices-for-maximizing-efficiency-governance-and-optimization</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT1-1.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT11</image:caption><image:title>EMASponsoredBy125pxHEAT11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/digital-transformation-and-the-new-war-room</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-benefits-of-leveraging-msps-for-performance-and-security-monitoring</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/006b1_EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>006b1EMASponsoredByForescout125px</image:caption><image:title>006b1EMASponsoredByForescout125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cisco-live-whats-the-signal-in-the-ai-noise</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsac-2024.jpg</image:loc><image:caption>rsac2024</image:caption><image:title>rsac2024</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/2024-splunk-conference.jpg</image:loc><image:caption>2024splunkconference</image:caption><image:title>2024splunkconference</image:title></image:image><lastmod>2024-06-05</lastmod></url><url><loc>https://blog.enterprisemanagement.com/hpe-to-acquire-juniper-networks</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/decoding-cybersecurity-trends-for-2024.jpg</image:loc><image:caption>decodingcybersecuritytrendsfor2024</image:caption><image:title>decodingcybersecuritytrendsfor2024</image:title></image:image><lastmod>2024-01-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ciscos-big-data-analytics-vision-some-data-will-be-distributed-forever</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT</image:caption><image:title>EMASponsoredBy125pxHEAT</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT1.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT1</image:caption><image:title>EMASponsoredBy125pxHEAT1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/dos-and-donts-for-the-data-scientist</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/fd569_bigData-150x150.jpg</image:loc><image:caption>fd569bigData150x150</image:caption><image:title>fd569bigData150x150</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/65f91_2015-HDE-300x262.jpg</image:loc><image:caption>65f912015HDE300x262</image:caption><image:title>65f912015HDE300x262</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/creating-personalized-targeted-weinbars</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Understanding%20Cloud%20Market%20Share%20copy.jpg</image:loc><image:caption>UnderstandingCloudMarketSharecopy</image:caption><image:title>UnderstandingCloudMarketSharecopy</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300person-holding-black-and-red-card-3804136-1.jpg</image:loc><image:caption>300personholdingblackandredcard38041361</image:caption><image:title>300personholdingblackandredcard38041361</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300macbook-pro-on-black-table-3787591.jpg</image:loc><image:caption>300macbookproonblacktable3787591</image:caption><image:title>300macbookproonblacktable3787591</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2020-03-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/digital-marketing-know-the-person-you-want-to-target</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/User%20Experience%20Management.jpg</image:loc><image:caption>UserExperienceManagement</image:caption><image:title>UserExperienceManagement</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/human-592734_1920.jpg</image:loc><image:caption>human5927341920</image:caption><image:title>human5927341920</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/shopping-cart-1275480_1920.jpg</image:loc><image:caption>shoppingcart12754801920</image:caption><image:title>shoppingcart12754801920</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2020-04-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/rapid-evolution-openstack-is-growing-up</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/allgress-insight-risk-management-suite-brings-flexibility-and-functionality-to-it-grc</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-software-defined-datacenter-part-2-core-components</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/CoreComponents-300x238.png</image:loc><image:caption>CoreComponents300x238</image:caption><image:title>CoreComponents300x238</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/The-Software-Defined-Datacenter.jpg</image:loc><image:caption>TheSoftwareDefinedDatacenter</image:caption><image:title>TheSoftwareDefinedDatacenter</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-marketing-technical-products</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-02-27</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/integrated-itsm-the-service-deskoperationsanalytics</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/windows-8-the-mobile-dark-horse-0</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ThinkstockPhotos-518427664.jpg</image:loc><image:caption>ThinkstockPhotos518427664</image:caption><image:title>ThinkstockPhotos518427664</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UEM.jpeg</image:loc><image:caption>UEM</image:caption><image:title>UEM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMAIL%20banners/EMA-NetManMegatrends-0418-email-banner.jpg</image:loc><image:caption>EMANetManMegatrends0418emailbanner</image:caption><image:title>EMANetManMegatrends0418emailbanner</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_213592256%20(1)%20-%20Copy-1.jpeg</image:loc><image:caption>AdobeStock2135922561Copy1</image:caption><image:title>AdobeStock2135922561Copy1</image:title></image:image><lastmod>2019-11-26</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-ai-cyberattacks</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2025-05-20</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/100-lines-about-25-business-intelligence-topics-for-2013</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum2.jpg</image:loc><image:caption>emaBiContinuum2</image:caption><image:title>emaBiContinuum2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_DataAcquisition.jpg</image:loc><image:caption>emaBiContinuumDataAcquisition</image:caption><image:title>emaBiContinuumDataAcquisition</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/workload-automation-is-not-just-for-large-enterprises-anymore</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/signal-microsoft-teams-and-the-security-convenience-paradox</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/signs-vs-microsoft-teams.jpg</image:loc><image:caption>signsvsmicrosoftteams</image:caption><image:title>signsvsmicrosoftteams</image:title></image:image><lastmod>2025-03-27</lastmod></url><url><loc>https://blog.enterprisemanagement.com/putting-the-user-into-user-experience-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UEM.jpg</image:loc><image:caption>UEM</image:caption><image:title>UEM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ciscolive-us-logo.png</image:loc><image:caption>ciscoliveuslogo</image:caption><image:title>ciscoliveuslogo</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/iStock_000000173217XSmall.jpg</image:loc><image:caption>iStock000000173217XSmall</image:caption><image:title>iStock000000173217XSmall</image:title></image:image><lastmod>2018-05-31</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/symantec-cyberwar-games-provide-valuable-cyber-insight</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-myth-of-the-single-vendor-unified-management-platform</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Rainbow-300x199.jpg</image:loc><image:caption>Rainbow300x199</image:caption><image:title>Rainbow300x199</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/choosing-a-client-lifecycle-management-solution</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Rainbow-300x199.jpg</image:loc><image:caption>Rainbow300x199</image:caption><image:title>Rainbow300x199</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/unified-endpoint-management-bringing-multi-device-support-to-the-next-generation-of-business-professionals</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/22501_EMA-SponsoredBy_ivanti.jpg</image:loc><image:caption>22501EMASponsoredByivanti</image:caption><image:title>22501EMASponsoredByivanti</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/22501_UEM-chart-1.png</image:loc><image:caption>22501UEMchart1</image:caption><image:title>22501UEMchart1</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/f5-waf-aws-cloudfront-integration</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_328712853-4.jpeg</image:loc><image:caption>AdobeStock3287128534</image:caption><image:title>AdobeStock3287128534</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/F5%20AWS%20small-2.jpg</image:loc><image:caption>F5AWSsmall2</image:caption><image:title>F5AWSsmall2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/F5%20AWS%20small-1.jpg</image:loc><image:caption>F5AWSsmall1</image:caption><image:title>F5AWSsmall1</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/introduction-and-thoughts-about-recent-surveillance-revelations-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/endpoint-management-and-security-more-effective-as-partners-than-adversaries</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>EMASponsoredByForescout125px</image:caption><image:title>EMASponsoredByForescout125px</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/heat-software-meets-the-need-for-endpoint-protection-head-on</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/570e2_emaBiContinuum_KnowledgeDelivery2-300x93.jpg</image:loc><image:caption>570e2emaBiContinuumKnowledgeDelivery2300x93</image:caption><image:title>570e2emaBiContinuumKnowledgeDelivery2300x93</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture4.png</image:loc><image:caption>Picture4</image:caption><image:title>Picture4</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/network-automation-strategies-must-include-change-validation</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsa-preview-2024-1.jpg</image:loc><image:caption>rsapreview20241</image:caption><image:title>rsapreview20241</image:title></image:image><lastmod>2024-04-12</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/gaining-data-control-with-byod-and-bluebox</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/on-the-menu-at-the-systems-cafe</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/business-process-management-in-the-real-world-why-its-important-to-govern-both-automated-and-manual-processes</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT1-1.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT11</image:caption><image:title>EMASponsoredBy125pxHEAT11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT-3.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT3</image:caption><image:title>EMASponsoredBy125pxHEAT3</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/black-hat-asia-2025</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/hack-to-the-future.jpg</image:loc><image:caption>hacktothefuture</image:caption><image:title>hacktothefuture</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><lastmod>2025-04-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/rsac-2022-closing-thoughts</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/VtW_Badge-Graphiant_0822.png</image:loc><image:caption>VtWBadgeGraphiant0822</image:caption><image:title>VtWBadgeGraphiant0822</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-informatica-world-2022-reflection-1.jpg</image:loc><image:caption>emainformaticaworld2022reflection1</image:caption><image:title>emainformaticaworld2022reflection1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-rsac-2022-cybersecurity-conferences.jpg</image:loc><image:caption>emarsac2022cybersecurityconferences</image:caption><image:title>emarsac2022cybersecurityconferences</image:title></image:image><lastmod>2022-06-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/digital-marketing-understand-how-people-buy</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/computer-4146579_640.jpg</image:loc><image:caption>computer4146579640</image:caption><image:title>computer4146579640</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/challenger.png</image:loc><image:caption>challenger</image:caption><image:title>challenger</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/human-592734_1920.jpg</image:loc><image:caption>human5927341920</image:caption><image:title>human5927341920</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/shopping-cart-1275480_1920.jpg</image:loc><image:caption>shoppingcart12754801920</image:caption><image:title>shoppingcart12754801920</image:title></image:image><lastmod>2020-04-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/pfp-cybersecurity-breaks-on-to-the-scene-to-identify-malware-at-the-chip-level</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/re-inventing-the-facebook-interface-with-analytics</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/user-experience-matters-in-self-service-provisioning</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px-2.jpg</image:loc><image:caption>EMASponsoredByHEAT125px2</image:caption><image:title>EMASponsoredByHEAT125px2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/running-containers-doesnt-have-to-mean-running-blind</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>EMASponsoredByHEAT125px</image:caption><image:title>EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/sysdig-overview2-300x192.png</image:loc><image:caption>sysdigoverview2300x192</image:caption><image:title>sysdigoverview2300x192</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px-2.jpg</image:loc><image:caption>EMASponsoredByHEAT125px2</image:caption><image:title>EMASponsoredByHEAT125px2</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/linux-on-power-poised-for-greatness</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems2.png</image:loc><image:caption>EMASponsoredByHelpSystems2</image:caption><image:title>EMASponsoredByHelpSystems2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-ransomware</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-02-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2017/02/10/juniper-founder-steps-run-startup-fungible-fungible</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/22501_UEM-chart-1.png</image:loc><image:caption>22501UEMchart1</image:caption><image:title>22501UEMchart1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/diskless-vdi-resolving-the-vdi-storage-cost-bottleneck</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/cmdb-systems-the-quiet-revolution</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/making-your-service-desk-less-vocal-actually-tells-you-things-are-as-they-should-be</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/burning-money-300x243.png</image:loc><image:caption>burningmoney300x243</image:caption><image:title>burningmoney300x243</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/a6f68_EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>a6f68EMASponsoredByHEAT125px</image:caption><image:title>a6f68EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/physical-virtual-cloud-upcoming-ema-research</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/star-wars-day-how-security-failures-led-to-the-empires-downfall</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/image-1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Service%20image_rs.jpg</image:loc><image:caption>Serviceimagers</image:caption><image:title>Serviceimagers</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity_twitter.jpg</image:loc><image:caption>cybersecuritytwitter</image:caption><image:title>cybersecuritytwitter</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/image-2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/SW%20Day.jpg</image:loc><image:caption>SWDay</image:caption><image:title>SWDay</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/image-4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><lastmod>2023-05-04</lastmod></url><url><loc>https://blog.enterprisemanagement.com/heartbleed-vulnerability</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Valentines_Blog_Chart-01.jpg</image:loc><image:caption>ValentinesBlogChart01</image:caption><image:title>ValentinesBlogChart01</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/VtW_Badge-Graphiant_0822.png</image:loc><image:caption>VtWBadgeGraphiant0822</image:caption><image:title>VtWBadgeGraphiant0822</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-a-valentines-day-wakeup-call-2.jpg</image:loc><image:caption>emaavalentinesdaywakeupcall2</image:caption><image:title>emaavalentinesdaywakeupcall2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Glass%20half%20full_RS.jpg</image:loc><image:caption>GlasshalffullRS</image:caption><image:title>GlasshalffullRS</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Valentines_Blog_Chart-02.jpg</image:loc><image:caption>ValentinesBlogChart02</image:caption><image:title>ValentinesBlogChart02</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/biometrics</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-09-12%20at%205.08.00%20PM.png</image:loc><image:caption>Screenshot20240912at50800PM</image:caption><image:title>Screenshot20240912at50800PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/opentext-world-2024-recap-02.jpg</image:loc><image:caption>opentextworld2024recap02</image:caption><image:title>opentextworld2024recap02</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-week.jpg</image:loc><image:caption>identityweek</image:caption><image:title>identityweek</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2024-09-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/early-adopters-define-sdn</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/software-defined-storage-the-vendor-landscape-part-2-of-2-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/SDDC-Sponsors.png</image:loc><image:caption>SDDCSponsors</image:caption><image:title>SDDCSponsors</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/edtech-networkers-be-ready-for-cloud-sdn-and-iot-this-year</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/59300_EMA-SponsoredBy_HelpSystems.png</image:loc><image:caption>59300EMASponsoredByHelpSystems</image:caption><image:title>59300EMASponsoredByHelpSystems</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/why-advanced-operational-analytics-aoa-is-not-for-20-men-or-women-in-white-lab-coats</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/vectra-provides-pervasive-visibility-analysis-to-detect-cyber-attacks</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT-2.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT2</image:caption><image:title>EMASponsoredBy125pxHEAT2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT-3.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT3</image:caption><image:title>EMASponsoredBy125pxHEAT3</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/cloud-security-alliance-hack-a-thon-and-the-software-defined-perimeter</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Damballa-Bit94.jpg</image:loc><image:caption>DamballaBit94</image:caption><image:title>DamballaBit94</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/outsource-the-hassle-stay-in-control-10-advantages-of-software-as-a-service</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/guest-blog-parallels-how-to-bring-the-cloud-to-the-smb-marketplace</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/megatrends-means-what-exactly</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/increased-focus-on-digital-experience-management-prompts-new-research-done-jointly-by-dennis-drogseth-and-julie-craig-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dennisdrogseth/2015/01/05/changing-game-service-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cisco-becomes-a-merchant-silicon-vendor-launches-a-disaggregated-super-router</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_213592256%20(1)%20-%20Copy-1.jpeg</image:loc><image:caption>AdobeStock2135922561Copy1</image:caption><image:title>AdobeStock2135922561Copy1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/calculator-1680905_960_720.jpg</image:loc><image:caption>calculator1680905960720</image:caption><image:title>calculator1680905960720</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ThinkstockPhotos-518427664.jpg</image:loc><image:caption>ThinkstockPhotos518427664</image:caption><image:title>ThinkstockPhotos518427664</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2019-12-12</lastmod></url><url><loc>https://blog.enterprisemanagement.com/accelerate-network-automation-by-pivoting-from-homegrown-to-commercial-software</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo-1.jpg</image:loc><image:caption>AxoniusLogo1</image:caption><image:title>AxoniusLogo1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/gluware%20featured.png</image:loc><image:caption>gluwarefeatured</image:caption><image:title>gluwarefeatured</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo-2.jpg</image:loc><image:caption>AxoniusLogo2</image:caption><image:title>AxoniusLogo2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2022-02-24</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/what-is-service-centric-asset-management-and-why-should-you-care</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Spider-sm.jpg</image:loc><image:caption>Spidersm</image:caption><image:title>Spidersm</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Annual-budget.png</image:loc><image:caption>Annualbudget</image:caption><image:title>Annualbudget</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/tips-on-getting-the-most-out-of-your-11-ipad-education-program</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>EMASponsoredByForescout125px</image:caption><image:title>EMASponsoredByForescout125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/netops-and-secops-partnerships-flourish-with-modern-ddi-technology</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screen%20Shot%202021-11-17%20at%2010.07.20%20AM.png</image:loc><image:caption>ScreenShot20211117at100720AM</image:caption><image:title>ScreenShot20211117at100720AM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/DatSec.png</image:loc><image:caption>DatSec</image:caption><image:title>DatSec</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo.jpg</image:loc><image:caption>AxoniusLogo</image:caption><image:title>AxoniusLogo</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2021-11-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/podcast-cloud-data-warehousing</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/fd569_Data_Management.jpg</image:loc><image:caption>fd569DataManagement</image:caption><image:title>fd569DataManagement</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/65f91_2015-HDE-300x262.jpg</image:loc><image:caption>65f912015HDE300x262</image:caption><image:title>65f912015HDE300x262</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/johnmyers/2014/07/10/data-analytics-service</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBusinessAnalyticsPyramid.jpg</image:loc><image:caption>emaBusinessAnalyticsPyramid</image:caption><image:title>emaBusinessAnalyticsPyramid</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2017/01/19/avaya_chapter_11</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/22501_UEM-chart-1.png</image:loc><image:caption>22501UEMchart1</image:caption><image:title>22501UEMchart1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-software-defined-datacenter-part-3-of-4-questions-and-battlefields</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/CoreComponents-300x238.png</image:loc><image:caption>CoreComponents300x238</image:caption><image:title>CoreComponents300x238</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/HDE-300x235.jpg</image:loc><image:caption>HDE300x235</image:caption><image:title>HDE300x235</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/nosql-implementation-drivers</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/thoughts-and-lessons-learned-from-an-analyst-and-ciso-conference</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/iStock_000000173217XSmall.jpg</image:loc><image:caption>iStock000000173217XSmall</image:caption><image:title>iStock000000173217XSmall</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UEM.jpg</image:loc><image:caption>UEM</image:caption><image:title>UEM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/sphere-network-dots-connections-ThinkstockPhotos-2.jpg</image:loc><image:caption>spherenetworkdotsconnectionsThinkstockPhotos2</image:caption><image:title>spherenetworkdotsconnectionsThinkstockPhotos2</image:title></image:image><lastmod>2018-05-15</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ema-radar-for-workload-automation-2012-key-findings</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/highlights-from-ibm-analyst-insights-2013</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-many-dimensions-of-user-experience-management-uem</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/top-5-trends-in-2015-for-unifying-pc-and-mobile-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/innovation-in-enterprise-it</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/InsightGuide_GuideOnly-300x282.jpg</image:loc><image:caption>InsightGuideGuideOnly300x282</image:caption><image:title>InsightGuideGuideOnly300x282</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/focusing-on-the-five-most-critical-cybersecurity-shifts-by-2026</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/5-cybersecurity-trends-for-2026.jpg</image:loc><image:caption>5cybersecuritytrendsfor2026</image:caption><image:title>5cybersecuritytrendsfor2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-week-2025.jpg</image:loc><image:caption>identityweek2025</image:caption><image:title>identityweek2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/android-security-changes-2025.jpg</image:loc><image:caption>androidsecuritychanges2025</image:caption><image:title>androidsecuritychanges2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2025-10-03</lastmod></url><url><loc>https://blog.enterprisemanagement.com/test</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMA-blog-header-bg-2018.jpg</image:loc><image:caption>EMAblogheaderbg2018</image:caption><image:title>EMAblogheaderbg2018</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMA-tagline-290x57px.png</image:loc><image:caption>EMAtagline290x57px</image:caption><image:title>EMAtagline290x57px</image:title></image:image><lastmod>2023-08-03</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/windows-8-the-mobile-dark-horse</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/itil-and-the-elusive-configuration-manager-among-other-roles</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Annual-budget.png</image:loc><image:caption>Annualbudget</image:caption><image:title>Annualbudget</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ca-technologies-pushes-for-diversity-in-tech-industry</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-state-of-the-software-defined-data-center</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/SDDC-Sponsors.png</image:loc><image:caption>SDDCSponsors</image:caption><image:title>SDDCSponsors</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/passwords-an-outdated-security-measure-in-modern-times</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/passwordless%20authentication.jpeg</image:loc><image:caption>passwordlessauthentication</image:caption><image:title>passwordlessauthentication</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/dynatrace-perform-2024.jpg</image:loc><image:caption>dynatraceperform2024</image:caption><image:title>dynatraceperform2024</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2024-03-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/policy-driven-workload-provisioning-clouds-unleashing-true-hybrid-cloud</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/a6f68_EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>a6f68EMASponsoredByHEAT125px</image:caption><image:title>a6f68EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/a0b60_EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>a0b60EMASponsoredByHEAT125px</image:caption><image:title>a0b60EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Mistake-300x169.jpg</image:loc><image:caption>Mistake300x169</image:caption><image:title>Mistake300x169</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/burning-money-300x243.png</image:loc><image:caption>burningmoney300x243</image:caption><image:title>burningmoney300x243</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/prison-300x156.jpg</image:loc><image:caption>prison300x156</image:caption><image:title>prison300x156</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/naas-providers-must-offer-observability-into-their-networks</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/2024-splunk-conference.jpg</image:loc><image:caption>2024splunkconference</image:caption><image:title>2024splunkconference</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-09-12%20at%205.08.00%20PM.png</image:loc><image:caption>Screenshot20240912at50800PM</image:caption><image:title>Screenshot20240912at50800PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2024-08-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-123-cybersecurity-and-the-new-school-year</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-week-2025.jpg</image:loc><image:caption>identityweek2025</image:caption><image:title>identityweek2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-09-18</lastmod></url><url><loc>https://blog.enterprisemanagement.com/avoid-these-mistakes-when-applying-generative-ai-to-it-operations</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-09-12%20at%205.08.00%20PM.png</image:loc><image:caption>Screenshot20240912at50800PM</image:caption><image:title>Screenshot20240912at50800PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-week.jpg</image:loc><image:caption>identityweek</image:caption><image:title>identityweek</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-09-12%20at%205.07.46%20PM.png</image:loc><image:caption>Screenshot20240912at50746PM</image:caption><image:title>Screenshot20240912at50746PM</image:title></image:image><lastmod>2024-10-10</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-tax-scams</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/redefining-ptaas.jpg</image:loc><image:caption>redefiningptaas</image:caption><image:title>redefiningptaas</image:title></image:image><lastmod>2025-03-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/forescout-technologies-has-a-knack-for-nac-and-more-with-controlfabric-and-counteract</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/creative-engaging-inspirational-informative-webinars-drive-the-most-leads</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/calculator-1680905_960_720.jpg</image:loc><image:caption>calculator1680905960720</image:caption><image:title>calculator1680905960720</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300black-and-silver-laptop-computer-on-white-table-3787603-1.jpg</image:loc><image:caption>300blackandsilverlaptopcomputeronwhitetable37876031</image:caption><image:title>300blackandsilverlaptopcomputeronwhitetable37876031</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300person-holding-black-and-red-card-3804136-1.jpg</image:loc><image:caption>300personholdingblackandredcard38041361</image:caption><image:title>300personholdingblackandredcard38041361</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2020-03-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/cisco-dna-is-marchitecture-but-also-a-shift-away-from-cli</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/a-collaborative-journey-to-the-cloud</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/The-Software-Defined-Datacenter.jpg</image:loc><image:caption>TheSoftwareDefinedDatacenter</image:caption><image:title>TheSoftwareDefinedDatacenter</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/optimizing-change-management-for-cloud-agile-and-mobile-how-the-technologies-are-evolving</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-1.png</image:loc><image:caption>EMASponsoredByHelpSystems1</image:caption><image:title>EMASponsoredByHelpSystems1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-2.png</image:loc><image:caption>EMASponsoredByHelpSystems2</image:caption><image:title>EMASponsoredByHelpSystems2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dantwing/2017/06/02/324</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/why-most-cloud-deployments-need-a-restart</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Spider-sm.jpg</image:loc><image:caption>Spidersm</image:caption><image:title>Spidersm</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/from-file-share-to-owncloud-dropbox-and-res-hyperdrive</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/IBMSmartCloudBlog.jpg</image:loc><image:caption>IBMSmartCloudBlog</image:caption><image:title>IBMSmartCloudBlog</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2015/03/04/docker-acquires-socketplane-multihost-container-networking</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/data-security-in-a-multi-cloud-world</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screen%20Shot%202021-11-17%20at%2010.07.20%20AM.png</image:loc><image:caption>ScreenShot20211117at100720AM</image:caption><image:title>ScreenShot20211117at100720AM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/DatSec.png</image:loc><image:caption>DatSec</image:caption><image:title>DatSec</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_261806448.jpeg</image:loc><image:caption>AdobeStock261806448</image:caption><image:title>AdobeStock261806448</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/data-management-in-2013-warning-of-the-big-data-wolf</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_BusinessAnalytics.jpg</image:loc><image:caption>emaBiContinuumBusinessAnalytics</image:caption><image:title>emaBiContinuumBusinessAnalytics</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_DataMgmt.jpg</image:loc><image:caption>emaBiContinuumDataMgmt</image:caption><image:title>emaBiContinuumDataMgmt</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_DataAcquisition.jpg</image:loc><image:caption>emaBiContinuumDataAcquisition</image:caption><image:title>emaBiContinuumDataAcquisition</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/simplify-vulnerability-management-with-cybersecurity-asset-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo-1.jpg</image:loc><image:caption>AxoniusLogo1</image:caption><image:title>AxoniusLogo1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screen%20Shot%202021-11-17%20at%2010.07.20%20AM.png</image:loc><image:caption>ScreenShot20211117at100720AM</image:caption><image:title>ScreenShot20211117at100720AM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo.jpg</image:loc><image:caption>AxoniusLogo</image:caption><image:title>AxoniusLogo</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://blog.enterprisemanagement.com/with-what-snack-food-will-you-authenticate-identity-week-2025</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/identity-week-2025.jpg</image:loc><image:caption>identityweek2025</image:caption><image:title>identityweek2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/5-cybersecurity-trends-for-2026.jpg</image:loc><image:caption>5cybersecuritytrendsfor2026</image:caption><image:title>5cybersecuritytrendsfor2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><lastmod>2025-09-29</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/advanced-it-analytics-making-it-simpler-to-optimize-whats-more-complex</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/b7aa8_foosball.png</image:loc><image:caption>b7aa8foosball</image:caption><image:title>b7aa8foosball</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/it-cultural-transformation-and-the-elimination-of-technology-silos-an-exercise-in-efficiency-or-a-dream-turned-nightmare</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT-2.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT2</image:caption><image:title>EMASponsoredBy125pxHEAT2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/2015-HDE-300x262.jpg</image:loc><image:caption>2015HDE300x262</image:caption><image:title>2015HDE300x262</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/rewarding-impatience-with-user-self-service</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT-3.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT3</image:caption><image:title>EMASponsoredBy125pxHEAT3</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT1-1.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT11</image:caption><image:title>EMASponsoredBy125pxHEAT11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2015/08/28/intermapper-application-splunk-answers-log-analytics-network-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-3.png</image:loc><image:caption>EMASponsoredByHelpSystems3</image:caption><image:title>EMASponsoredByHelpSystems3</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ema-cloud-rants-pilot-episode-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/SDDC-Sponsors.png</image:loc><image:caption>SDDCSponsors</image:caption><image:title>SDDCSponsors</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/serviceops-is-the-right-idea.-so-why-is-it-such-a-challenge</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI%20and%20cybersecurity.jpg</image:loc><image:caption>AIandcybersecurity</image:caption><image:title>AIandcybersecurity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Parker%20Hathcock.png</image:loc><image:caption>ParkerHathcock</image:caption><image:title>ParkerHathcock</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202025-12-08%20at%202.36.09%20PM.png</image:loc><image:caption>Screenshot20251208at23609PM</image:caption><image:title>Screenshot20251208at23609PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/redefining-modern-service-management-2025.jpg</image:loc><image:caption>redefiningmodernservicemanagement2025</image:caption><image:title>redefiningmodernservicemanagement2025</image:title></image:image><lastmod>2025-12-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/iot-enterprise-risk-report</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/bsm-analytics-what-are-they-and-why-should-you-care-part-one</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-rise-of-thingbots-in-the-internet-of-things-iot</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture4.png</image:loc><image:caption>Picture4</image:caption><image:title>Picture4</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/C-Level-Finacial-backing-of-security-projects.png</image:loc><image:caption>CLevelFinacialbackingofsecurityprojects</image:caption><image:title>CLevelFinacialbackingofsecurityprojects</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2017/01/12/dell-emc-opens-door-white-box-campus-switching</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/22501_UEM-chart-1.png</image:loc><image:caption>22501UEMchart1</image:caption><image:title>22501UEMchart1</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/generative-ai-cloud-security-and-more-at-black-hat-2023</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-it-nation-secure-conference-recap.jpg</image:loc><image:caption>emaitnationsecureconferencerecap</image:caption><image:title>emaitnationsecureconferencerecap</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Black-Hat-Blog-Chart-02.jpg</image:loc><image:caption>BlackHatBlogChart02</image:caption><image:title>BlackHatBlogChart02</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-black-hat-2023-recap.jpg</image:loc><image:caption>emablackhat2023recap</image:caption><image:title>emablackhat2023recap</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/CMDB.jpeg</image:loc><image:caption>CMDB</image:caption><image:title>CMDB</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Black-Hat-Blog-Chart-01.jpg</image:loc><image:caption>BlackHatBlogChart01</image:caption><image:title>BlackHatBlogChart01</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2023-08-18</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-marketing-in-the-wake-of-googles-september-data-disruption</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-and-marketing-2025.jpg</image:loc><image:caption>cybersecurityandmarketing2025</image:caption><image:title>cybersecurityandmarketing2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/android-security-changes-2025.jpg</image:loc><image:caption>androidsecuritychanges2025</image:caption><image:title>androidsecuritychanges2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-impacts-of-nobel-prize-2025.jpg</image:loc><image:caption>cybersecurityimpactsofnobelprize2025</image:caption><image:title>cybersecurityimpactsofnobelprize2025</image:title></image:image><lastmod>2025-10-08</lastmod></url><url><loc>https://blog.enterprisemanagement.com/is-triggered-or-smart-pack-capture-a-foolproof-alternative-to-always-on-pcap</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/passwordless%20authentication.jpeg</image:loc><image:caption>passwordlessauthentication</image:caption><image:title>passwordlessauthentication</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2024-03-25</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/top-5-indications-its-time-to-transition-to-a-hybrid-cloud</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/vmworld-2013-digest-8-companies-you-should-take-a-closer-look-at</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/storage-hypervisor-chart.png</image:loc><image:caption>storagehypervisorchart</image:caption><image:title>storagehypervisorchart</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cyber-attackers-turn-their-sight-to-erp-applications</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Colorful-Nebulae.jpg</image:loc><image:caption>ColorfulNebulae</image:caption><image:title>ColorfulNebulae</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Landing%20Page%20banner%20backgrounds/security-lock-computer-system-2.jpg</image:loc><image:caption>securitylockcomputersystem2</image:caption><image:title>securitylockcomputersystem2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/marcbenioff.jpg</image:loc><image:caption>marcbenioff</image:caption><image:title>marcbenioff</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/PMusich.png</image:loc><image:caption>PMusich</image:caption><image:title>PMusich</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-09-26</lastmod></url><url><loc>https://blog.enterprisemanagement.com/davidmonahan/2017/01/03/tribute-security-researchers-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/65f91_2015-HDE-300x262.jpg</image:loc><image:caption>65f912015HDE300x262</image:caption><image:title>65f912015HDE300x262</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/point-products-support-data-center-infrastructure-management-dcim-stop-calling</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/HDE-300x235.jpg</image:loc><image:caption>HDE300x235</image:caption><image:title>HDE300x235</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum2.jpg</image:loc><image:caption>emaBiContinuum2</image:caption><image:title>emaBiContinuum2</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/oracle-continues-ma-activities-with-endeca</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Dentrix-Mobile-300x227.jpg</image:loc><image:caption>DentrixMobile300x227</image:caption><image:title>DentrixMobile300x227</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/review-of-the-2024-splunk-conference</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/IMG_7289.jpeg</image:loc><image:caption>IMG7289</image:caption><image:title>IMG7289</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/IMG_7379.jpeg</image:loc><image:caption>IMG7379</image:caption><image:title>IMG7379</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/2024-splunk-conference.jpg</image:loc><image:caption>2024splunkconference</image:caption><image:title>2024splunkconference</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ibm-pulse-2012-visibility-control-automation</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/IBMSmartCloudBlog.jpg</image:loc><image:caption>IBMSmartCloudBlog</image:caption><image:title>IBMSmartCloudBlog</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/black-hat-2025-the-year-of-the-ai-arms-race</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/agentic-ai-black-hat.jpg</image:loc><image:caption>agenticaiblackhat</image:caption><image:title>agenticaiblackhat</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><lastmod>2025-08-15</lastmod></url><url><loc>https://blog.enterprisemanagement.com/johnmyers/2017/01/04/analytical-resolutions-technologists-tech-teams-2017</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/fd569_emaBiContinuum_DataMgmt-300x93.jpg</image:loc><image:caption>fd569emaBiContinuumDataMgmt300x93</image:caption><image:title>fd569emaBiContinuumDataMgmt300x93</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/006b1_EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>006b1EMASponsoredByForescout125px</image:caption><image:title>006b1EMASponsoredByForescout125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-117-the-security-triad</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-07-23</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/podcast-discussing-qlik-unsummit-and-qlikview-12</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/570e2_emaBiContinuum_KnowledgeDelivery2-300x93.jpg</image:loc><image:caption>570e2emaBiContinuumKnowledgeDelivery2300x93</image:caption><image:title>570e2emaBiContinuumKnowledgeDelivery2300x93</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/intelligent-mice-mouse-traps-cyber-security-artificial-intelligence</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/red%20hat%20thumb.png</image:loc><image:caption>redhatthumb</image:caption><image:title>redhatthumb</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-cyber-security-cat-mouse.jpg</image:loc><image:caption>emacybersecuritycatmouse</image:caption><image:title>emacybersecuritycatmouse</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-informatica-world-2022-reflection-1.jpg</image:loc><image:caption>emainformaticaworld2022reflection1</image:caption><image:title>emainformaticaworld2022reflection1</image:title></image:image><lastmod>2022-05-31</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/leveraging-user-activity-monitoring-to-protect-information-and-employees-from-cyber-threats</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/2015-HDE-300x262.jpg</image:loc><image:caption>2015HDE300x262</image:caption><image:title>2015HDE300x262</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/rsa-conference-2024-tales-from-the-show-floor-how-security-needs-to-focus-on-user-experience</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsac-2024-tales-from-the-floor.jpg</image:loc><image:caption>rsac2024talesfromthefloor</image:caption><image:title>rsac2024talesfromthefloor</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/rsac-2024.jpg</image:loc><image:caption>rsac2024</image:caption><image:title>rsac2024</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-05-14%20at%204.48.09%20PM.png</image:loc><image:caption>Screenshot20240514at44809PM</image:caption><image:title>Screenshot20240514at44809PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2024-05-21</lastmod></url><url><loc>https://blog.enterprisemanagement.com</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-at-30.jpg</image:loc><image:caption>emaat30</image:caption><image:title>emaat30</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/scammer-emailed-me-his-source-code.jpg</image:loc><image:caption>scammeremailedmehissourcecode</image:caption><image:title>scammeremailedmehissourcecode</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/key-takeaways-from-rsac-2026.jpg</image:loc><image:caption>keytakeawaysfromrsac2026</image:caption><image:title>keytakeawaysfromrsac2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/agentic-ddi.jpg</image:loc><image:caption>agenticddi</image:caption><image:title>agenticddi</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity%20trends%202026.jpg</image:loc><image:caption>cybersecuritytrends2026</image:caption><image:title>cybersecuritytrends2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI-network-ThinkstockPhotos-647837760.jpg</image:loc><image:caption>AInetworkThinkstockPhotos647837760</image:caption><image:title>AInetworkThinkstockPhotos647837760</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ai-trust.jpg</image:loc><image:caption>aitrust</image:caption><image:title>aitrust</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI%20and%20cybersecurity.jpg</image:loc><image:caption>AIandcybersecurity</image:caption><image:title>AIandcybersecurity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ai-native-triple-threat.jpg</image:loc><image:caption>ainativetriplethreat</image:caption><image:title>ainativetriplethreat</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/fleetdm.jpg</image:loc><image:caption>fleetdm</image:caption><image:title>fleetdm</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2025-01-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-129-data-security-and-software-updates</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/aws-outage.jpg</image:loc><image:caption>awsoutage</image:caption><image:title>awsoutage</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-impacts-of-nobel-prize-2025.jpg</image:loc><image:caption>cybersecurityimpactsofnobelprize2025</image:caption><image:title>cybersecurityimpactsofnobelprize2025</image:title></image:image><lastmod>2025-10-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/celonis-process-mining-a-modern-value-creation-engine-for-the-digital-world</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/Tableau_Conference_2_700x400_0.png</image:loc><image:caption>TableauConference2700x4000</image:caption><image:title>TableauConference2700x4000</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/convergence-data-blue.jpg</image:loc><image:caption>convergencedatablue</image:caption><image:title>convergencedatablue</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/gears-3699316_1920%5B1%5D.jpg</image:loc><image:caption>gears369931619201</image:caption><image:title>gears369931619201</image:title></image:image><lastmod>2018-12-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dantwing/2016/03/16/qa-ema-radar-workload-automation-wla-q1-2016</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture1.jpg</image:loc><image:caption>Picture1</image:caption><image:title>Picture1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems1.png</image:loc><image:caption>EMASponsoredByHelpSystems1</image:caption><image:title>EMASponsoredByHelpSystems1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/many-network-engineers-want-ddi-vendors-to-add-agentic-ai-features</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/agentic-ddi.jpg</image:loc><image:caption>agenticddi</image:caption><image:title>agenticddi</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMA_November2017/Layout/Blog/agentic-ddi-figure02.jpg</image:loc><image:caption>agenticddifigure02</image:caption><image:title>agenticddifigure02</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMA_November2017/Layout/Blog/agentic-ddi-chart01.jpg</image:loc><image:caption>agenticddichart01</image:caption><image:title>agenticddichart01</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/key-takeaways-from-rsac-2026.jpg</image:loc><image:caption>keytakeawaysfromrsac2026</image:caption><image:title>keytakeawaysfromrsac2026</image:title></image:image><lastmod>2026-03-30</lastmod></url><url><loc>https://blog.enterprisemanagement.com/what-is-serviceops</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/mitigate-multi-cloud-networking-complexity.jpg</image:loc><image:caption>mitigatemulticloudnetworkingcomplexity</image:caption><image:title>mitigatemulticloudnetworkingcomplexity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ServiceOps-2.png</image:loc><image:caption>ServiceOps2</image:caption><image:title>ServiceOps2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Service%20image_rs.jpg</image:loc><image:caption>Serviceimagers</image:caption><image:title>Serviceimagers</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/SW%20Day.jpg</image:loc><image:caption>SWDay</image:caption><image:title>SWDay</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Valerie%20OConnell.jpg</image:loc><image:caption>ValerieOConnell</image:caption><image:title>ValerieOConnell</image:title></image:image><lastmod>2023-03-20</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/insights-from-operationalizing-cloud-research</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-ddos-mitigation</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><lastmod>2025-02-21</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/how-the-ema-hde-information-management-layer-impacts-the-growth-of-analytical-platforms</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/fd569_EMA-HDE-2000x1000px-300x150.jpg</image:loc><image:caption>fd569EMAHDE2000x1000px300x150</image:caption><image:title>fd569EMAHDE2000x1000px300x150</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/65f91_EMA-SponsoredBy125px_Attunity.jpg</image:loc><image:caption>65f91EMASponsoredBy125pxAttunity</image:caption><image:title>65f91EMASponsoredBy125pxAttunity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/65f91_2015-HDE-300x262.jpg</image:loc><image:caption>65f912015HDE300x262</image:caption><image:title>65f912015HDE300x262</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/optimizing-cloud-for-business-service-delivery-it-is-easier-said-than-done</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/what-the-iran-conflict-means-for-the-cybersecurity-industry</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/iran-conflict-2025.jpg</image:loc><image:caption>iranconflict2025</image:caption><image:title>iranconflict2025</image:title></image:image><lastmod>2025-06-24</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dantwing/2015/08/17/workload-automation-key-tool-fast-paced-tech-landscape</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-1.png</image:loc><image:caption>EMASponsoredByHelpSystems1</image:caption><image:title>EMASponsoredByHelpSystems1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/reflection-on-informatica-world-2022</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-rsac-2022-cybersecurity-conferences.jpg</image:loc><image:caption>emarsac2022cybersecurityconferences</image:caption><image:title>emarsac2022cybersecurityconferences</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-cyber-security-cat-mouse.jpg</image:loc><image:caption>emacybersecuritycatmouse</image:caption><image:title>emacybersecuritycatmouse</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Will_Schoeppner-01.jpg</image:loc><image:caption>WillSchoeppner01</image:caption><image:title>WillSchoeppner01</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-informatica-world-2022-reflection-1.jpg</image:loc><image:caption>emainformaticaworld2022reflection1</image:caption><image:title>emainformaticaworld2022reflection1</image:title></image:image><lastmod>2022-06-09</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-harsh-truth-about-layoffs-in-the-tech-industry</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/mitigate-multi-cloud-networking-complexity.jpg</image:loc><image:caption>mitigatemulticloudnetworkingcomplexity</image:caption><image:title>mitigatemulticloudnetworkingcomplexity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-a-valentines-day-wakeup-call-2.jpg</image:loc><image:caption>emaavalentinesdaywakeupcall2</image:caption><image:title>emaavalentinesdaywakeupcall2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Glass%20half%20full_RS.jpg</image:loc><image:caption>GlasshalffullRS</image:caption><image:title>GlasshalffullRS</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/ema-perspectives-informatica-makes-sparks-fly-in-the-cloud</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Colorful-Nebulae.jpg</image:loc><image:caption>ColorfulNebulae</image:caption><image:title>ColorfulNebulae</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Landing%20Page%20banner%20backgrounds/security-lock-computer-system-2.jpg</image:loc><image:caption>securitylockcomputersystem2</image:caption><image:title>securitylockcomputersystem2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/Cloud_building.jpg</image:loc><image:caption>Cloudbuilding</image:caption><image:title>Cloudbuilding</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-09-18</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/phish-ing-for-new-operational-revenues</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-134-llm-prompt-injection-attacks</loc><lastmod>2025-11-17</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/preparing-network-management-for-sdn-and-nfv</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/26d2d_EMA-SponsoredBy_HelpSystems.png</image:loc><image:caption>26d2dEMASponsoredByHelpSystems</image:caption><image:title>26d2dEMASponsoredByHelpSystems</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-limits-of-packet-capture</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-1.png</image:loc><image:caption>EMASponsoredByHelpSystems1</image:caption><image:title>EMASponsoredByHelpSystems1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-3.png</image:loc><image:caption>EMASponsoredByHelpSystems3</image:caption><image:title>EMASponsoredByHelpSystems3</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-magnificent-seven-itsm-2-0-challenges</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/a0b60_EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>a0b60EMASponsoredByHEAT125px</image:caption><image:title>a0b60EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/burning-money-300x243.png</image:loc><image:caption>burningmoney300x243</image:caption><image:title>burningmoney300x243</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-software-defined-datacenter-part-1-of-4-the-basics</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/CoreComponents-300x238.png</image:loc><image:caption>CoreComponents300x238</image:caption><image:title>CoreComponents300x238</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/The-Software-Defined-Datacenter.jpg</image:loc><image:caption>TheSoftwareDefinedDatacenter</image:caption><image:title>TheSoftwareDefinedDatacenter</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/dont-read-enterprise-mobility</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/SDDC-Sponsors.png</image:loc><image:caption>SDDCSponsors</image:caption><image:title>SDDCSponsors</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/openstack-thoughts-part-1-key-business-considerations</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Dell-Portfolio.png</image:loc><image:caption>DellPortfolio</image:caption><image:title>DellPortfolio</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/iStock_000008963147XSmall.jpg</image:loc><image:caption>iStock000008963147XSmall</image:caption><image:title>iStock000008963147XSmall</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/it-budgets-are-back</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Budget-by-region.png</image:loc><image:caption>Budgetbyregion</image:caption><image:title>Budgetbyregion</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Annual-budget.png</image:loc><image:caption>Annualbudget</image:caption><image:title>Annualbudget</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Budget-change.png</image:loc><image:caption>Budgetchange</image:caption><image:title>Budgetchange</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Q4-2009-2010-Budget.png</image:loc><image:caption>Q420092010Budget</image:caption><image:title>Q420092010Budget</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-deepseek</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2025-02-05</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-118-zero-day-attack-on-sharepoint</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/agentic-ai-black-hat.jpg</image:loc><image:caption>agenticaiblackhat</image:caption><image:title>agenticaiblackhat</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-07-28</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-transformational-promise-of-per-application-adcs</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/HASSO_SAPPHIRE.cropped.jpg</image:loc><image:caption>HASSOSAPPHIREcropped</image:caption><image:title>HASSOSAPPHIREcropped</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/bullseye%20computer%20iStock_000018640414XSmall.jpg</image:loc><image:caption>bullseyecomputeriStock000018640414XSmall</image:caption><image:title>bullseyecomputeriStock000018640414XSmall</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMAIL%20banners/EMA-NetManMegatrends-0418-email-banner.jpg</image:loc><image:caption>EMANetManMegatrends0418emailbanner</image:caption><image:title>EMANetManMegatrends0418emailbanner</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2019-05-23</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ca-analyst-symposium-ca-is-changing</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/gideon-gartner-says-use-a-spider-instead-of-a-magic-quadrant</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Spider-sm.jpg</image:loc><image:caption>Spidersm</image:caption><image:title>Spidersm</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/ADDM-Radar1.jpg</image:loc><image:caption>ADDMRadar1</image:caption><image:title>ADDMRadar1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/portfolio-tool-21.jpg</image:loc><image:caption>portfoliotool21</image:caption><image:title>portfoliotool21</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Portfolio-tool-1.jpg</image:loc><image:caption>Portfoliotool1</image:caption><image:title>Portfoliotool1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-recap-episode-116-false-sense-of-cybersecurity</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-07-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/salesforce-honors-customers-boosts-sales-productivity-gleanings-from-an-industry-analyst-observer</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/marcbenioff.jpg</image:loc><image:caption>marcbenioff</image:caption><image:title>marcbenioff</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/Tableau_Conference_2_700x400_0.png</image:loc><image:caption>TableauConference2700x4000</image:caption><image:title>TableauConference2700x4000</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/MirkoGroppTelstra.jpg</image:loc><image:caption>MirkoGroppTelstra</image:caption><image:title>MirkoGroppTelstra</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Landing%20Page%20banner%20backgrounds/security-lock-computer-system-2.jpg</image:loc><image:caption>securitylockcomputersystem2</image:caption><image:title>securitylockcomputersystem2</image:title></image:image><lastmod>2018-10-10</lastmod></url><url><loc>https://blog.enterprisemanagement.com/dennisdrogseth/2016/09/27/introducing-service-management-itsm-20-cornerstone-digital-transformation</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/a0b60_EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>a0b60EMASponsoredByHEAT125px</image:caption><image:title>a0b60EMASponsoredByHEAT125px</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-great-device-reset-mapping-the-2025-management-landscape-the-linux-management-blind-spot-and-the-2026-shift</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/fleetdm.jpg</image:loc><image:caption>fleetdm</image:caption><image:title>fleetdm</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/scammer-emailed-me-his-source-code.jpg</image:loc><image:caption>scammeremailedmehissourcecode</image:caption><image:title>scammeremailedmehissourcecode</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/fleetdm-chart-03.jpg</image:loc><image:caption>fleetdmchart03</image:caption><image:title>fleetdmchart03</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/fleetdm-chart-02.jpg</image:loc><image:caption>fleetdmchart02</image:caption><image:title>fleetdmchart02</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/fleetdm-chart-01.jpg</image:loc><image:caption>fleetdmchart01</image:caption><image:title>fleetdmchart01</image:title></image:image><lastmod>2026-02-02</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/leveraging-security-policy-orchestration-to-bake-security-in-to-sddc-environments</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/2016-looking-ahead-at-itsm-want-to-place-any-bets</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Picture1.jpg</image:loc><image:caption>Picture1</image:caption><image:title>Picture1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/5-reasons-to-transition-from-the-dark-ages-to-the-digital-age-with-a-document-management-system</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems1.png</image:loc><image:caption>EMASponsoredByHelpSystems1</image:caption><image:title>EMASponsoredByHelpSystems1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cisco-live-2018-forget-hardware-cisco-is-all-about-software</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ciscolive-us-logo.png</image:loc><image:caption>ciscoliveuslogo</image:caption><image:title>ciscoliveuslogo</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/UEM.jpg</image:loc><image:caption>UEM</image:caption><image:title>UEM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/1E-image.png</image:loc><image:caption>1Eimage</image:caption><image:title>1Eimage</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-06-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/is-your-organization-ready-for-windows-10</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT</image:caption><image:title>EMASponsoredBy125pxHEAT</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/digital-marketing-find-the-right-media-to-create-a-dialogue</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_353678393%20-%20Copy.jpeg</image:loc><image:caption>AdobeStock353678393Copy</image:caption><image:title>AdobeStock353678393Copy</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/shopping-cart-1275480_1920.jpg</image:loc><image:caption>shoppingcart12754801920</image:caption><image:title>shoppingcart12754801920</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Digital%20Syndication%20Model.jpg</image:loc><image:caption>DigitalSyndicationModel</image:caption><image:title>DigitalSyndicationModel</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/computer-4146579_640.jpg</image:loc><image:caption>computer4146579640</image:caption><image:title>computer4146579640</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2020-04-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/prioritizing-security-when-selecting-a-video-conferencing-solution</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/User%20Experience%20Management.jpg</image:loc><image:caption>UserExperienceManagement</image:caption><image:title>UserExperienceManagement</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/SecureVideoConferencing.jpg</image:loc><image:caption>SecureVideoConferencing</image:caption><image:title>SecureVideoConferencing</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/unnamed.png</image:loc><image:caption>unnamed</image:caption><image:title>unnamed</image:title></image:image><lastmod>2020-04-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-rsac</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/hack-to-the-future.jpg</image:loc><image:caption>hacktothefuture</image:caption><image:title>hacktothefuture</image:title></image:image><lastmod>2025-05-12</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/building-the-right-tool-for-the-job</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/InsightGuide_GuideOnly-300x282.jpg</image:loc><image:caption>InsightGuideGuideOnly300x282</image:caption><image:title>InsightGuideGuideOnly300x282</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/maybe-we-should-call-it-the-pre-post-pc-era</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Enterprise-User-Multi-Device-Adoption1-300x142.png</image:loc><image:caption>EnterpriseUserMultiDeviceAdoption1300x142</image:caption><image:title>EnterpriseUserMultiDeviceAdoption1300x142</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Dell-Portfolio.png</image:loc><image:caption>DellPortfolio</image:caption><image:title>DellPortfolio</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/a-path-toward-trusting-agentic-netops</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ai-trust.jpg</image:loc><image:caption>aitrust</image:caption><image:title>aitrust</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/fleetdm.jpg</image:loc><image:caption>fleetdm</image:caption><image:title>fleetdm</image:title></image:image><lastmod>2026-03-04</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/just-add-data-business-intelligence</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/InsightGuide_GuideOnly-300x282.jpg</image:loc><image:caption>InsightGuideGuideOnly300x282</image:caption><image:title>InsightGuideGuideOnly300x282</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/tech-at-the-gap-decoded</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-black-hat-2023-recap-1.jpg</image:loc><image:caption>emablackhat2023recap1</image:caption><image:title>emablackhat2023recap1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Data%20deconding.jpeg</image:loc><image:caption>Datadeconding</image:caption><image:title>Datadeconding</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/CMDB.jpeg</image:loc><image:caption>CMDB</image:caption><image:title>CMDB</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><lastmod>2023-10-23</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/data-integration-in-2013-give-us-a-platform-and-we-will-fill-it</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_DataMgmt.jpg</image:loc><image:caption>emaBiContinuumDataMgmt</image:caption><image:title>emaBiContinuumDataMgmt</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum2.jpg</image:loc><image:caption>emaBiContinuum2</image:caption><image:title>emaBiContinuum2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_DataAcquisition.jpg</image:loc><image:caption>emaBiContinuumDataAcquisition</image:caption><image:title>emaBiContinuumDataAcquisition</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/are-laptops-really-mobile-devices</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/sysdig-overview2-300x192.png</image:loc><image:caption>sysdigoverview2300x192</image:caption><image:title>sysdigoverview2300x192</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px.jpg</image:loc><image:caption>EMASponsoredByHEAT125px</image:caption><image:title>EMASponsoredByHEAT125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/security-awareness-programs-are-not-just-for-compliance</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/getting-started-with-a-network-source-of-truth</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202025-12-08%20at%202.36.09%20PM.png</image:loc><image:caption>Screenshot20251208at23609PM</image:caption><image:title>Screenshot20251208at23609PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/thanksgiving-2025.jpg</image:loc><image:caption>thanksgiving2025</image:caption><image:title>thanksgiving2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/redefining-modern-service-management-2025.jpg</image:loc><image:caption>redefiningmodernservicemanagement2025</image:caption><image:title>redefiningmodernservicemanagement2025</image:title></image:image><lastmod>2025-12-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/automating-change-the-key-to-proactive-it-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/user-experience-management-panel-in-boston</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/IBMSmartCloudBlog.jpg</image:loc><image:caption>IBMSmartCloudBlog</image:caption><image:title>IBMSmartCloudBlog</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-virtues-of-a-living-conversation-versus-one-frozen-in-stone</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/damballa-and-bit9-carbon-black-collaborate-to-deliver-better-security-with-more-context</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Damballa-Bit94.jpg</image:loc><image:caption>DamballaBit94</image:caption><image:title>DamballaBit94</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/change-management-metrics-best-practices-and-pitfalls</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems-2.png</image:loc><image:caption>EMASponsoredByHelpSystems2</image:caption><image:title>EMASponsoredByHelpSystems2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2015/05/21/open-network-management-focus-spring-onug-meeting</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2017/10/16/sdn-data-center-future</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/how-network-infrastructure-teams-support-the-internet-of-things</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/59300_EMA-SponsoredBy_HelpSystems.png</image:loc><image:caption>59300EMASponsoredByHelpSystems</image:caption><image:title>59300EMASponsoredByHelpSystems</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/a-scammer-sent-me-his-source-code-a-cautionary-tale-of-the-dangers-of-vibe-coding</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/fleetdm.jpg</image:loc><image:caption>fleetdm</image:caption><image:title>fleetdm</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/scammer-emailed-me-his-source-code.jpg</image:loc><image:caption>scammeremailedmehissourcecode</image:caption><image:title>scammeremailedmehissourcecode</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ai-native-triple-threat.jpg</image:loc><image:caption>ainativetriplethreat</image:caption><image:title>ainativetriplethreat</image:title></image:image><lastmod>2026-01-27</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-real-reason-your-workforce-is-not-as-productive-as-it-should-be</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Kaseya-125px.jpg</image:loc><image:caption>EMASponsoredByKaseya125px</image:caption><image:title>EMASponsoredByKaseya125px</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/ema-asked-networking-pros-what-should-network-automation-vendors-know-about-your-needs</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-02-20%20at%201.51.05%20PM.png</image:loc><image:caption>Screenshot20240220at15105PM</image:caption><image:title>Screenshot20240220at15105PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2024-02-15</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-impact-of-cloud-on-data-protection-ripple-or-sharknado</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/storage-hypervisor-chart.png</image:loc><image:caption>storagehypervisorchart</image:caption><image:title>storagehypervisorchart</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/10-creative-options-for-your-2020-webinars</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300person-holding-black-and-red-card-3804136-1.jpg</image:loc><image:caption>300personholdingblackandredcard38041361</image:caption><image:title>300personholdingblackandredcard38041361</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/JSantaferraro.png</image:loc><image:caption>JSantaferraro</image:caption><image:title>JSantaferraro</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300macbook-pro-on-black-table-3787591.jpg</image:loc><image:caption>300macbookproonblacktable3787591</image:caption><image:title>300macbookproonblacktable3787591</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300black-and-silver-laptop-computer-on-white-table-3787603-1.jpg</image:loc><image:caption>300blackandsilverlaptopcomputeronwhitetable37876031</image:caption><image:title>300blackandsilverlaptopcomputeronwhitetable37876031</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2020-03-11</lastmod></url><url><loc>https://blog.enterprisemanagement.com/five-reasons-consumer-iam-is-indispensable-in-the-new-normal</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_353678393.jpeg</image:loc><image:caption>AdobeStock353678393</image:caption><image:title>AdobeStock353678393</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/network-3443547_640.jpg</image:loc><image:caption>network3443547640</image:caption><image:title>network3443547640</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/kisspng-logo-akamai-technologies-internet-content-delivery-5c3286d0dfc856.0881538215468151849166.png</image:loc><image:caption>kisspnglogoakamaitechnologiesinternetcontentdelivery5c3286d0dfc8560881538215468151849166</image:caption><image:title>kisspnglogoakamaitechnologiesinternetcontentdelivery5c3286d0dfc8560881538215468151849166</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/IBM.png</image:loc><image:caption>IBM</image:caption><image:title>IBM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/computer-4146579_640.jpg</image:loc><image:caption>computer4146579640</image:caption><image:title>computer4146579640</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_353678393%20-%20Copy.jpeg</image:loc><image:caption>AdobeStock353678393Copy</image:caption><image:title>AdobeStock353678393Copy</image:title></image:image><lastmod>2020-08-19</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/is-emv-an-expensive-security-misstep-for-the-payments-industry</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-enterprise-service-catalog-unifying-it-services-for-the-digital-age</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-LightCyber-125px.jpg</image:loc><image:caption>EMASponsoredByLightCyber125px</image:caption><image:title>EMASponsoredByLightCyber125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/why-analytics-and-automation-are-central-to-itsm-transformation</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/C-Level-Finacial-backing-of-security-projects.png</image:loc><image:caption>CLevelFinacialbackingofsecurityprojects</image:caption><image:title>CLevelFinacialbackingofsecurityprojects</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-future-of-itsm-how-are-the-roles-and-the-rules-changing</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy125px-HEAT.jpg</image:loc><image:caption>EMASponsoredBy125pxHEAT</image:caption><image:title>EMASponsoredBy125pxHEAT</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/righting-a-wrong-ibm-is-a-leader-in-the-cloud</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/unnamed.png</image:loc><image:caption>unnamed</image:caption><image:title>unnamed</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Understanding%20Cloud%20Market%20Share%20copy.jpg</image:loc><image:caption>UnderstandingCloudMarketSharecopy</image:caption><image:title>UnderstandingCloudMarketSharecopy</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/300macbook-pro-on-black-table-3787591.jpg</image:loc><image:caption>300macbookproonblacktable3787591</image:caption><image:title>300macbookproonblacktable3787591</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2020-03-13</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-top-5-iot-lessons-i-learned-from-hollywood</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>EMASponsoredByForescout125px</image:caption><image:title>EMASponsoredByForescout125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/gathering-cloud-strength-in-numbers</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/googles-new-android-developer-verification-will-increase-device-security-risk-for-power-users</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-and-marketing-2025.jpg</image:loc><image:caption>cybersecurityandmarketing2025</image:caption><image:title>cybersecurityandmarketing2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/5-cybersecurity-trends-for-2026.jpg</image:loc><image:caption>5cybersecuritytrendsfor2026</image:caption><image:title>5cybersecuritytrendsfor2026</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/android-security-changes-2025.jpg</image:loc><image:caption>androidsecuritychanges2025</image:caption><image:title>androidsecuritychanges2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-ken.jpg</image:loc><image:caption>analystken</image:caption><image:title>analystken</image:title></image:image><lastmod>2025-10-06</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/workload-automation-a-future-outlook</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/Dentrix-Mobile-300x227.jpg</image:loc><image:caption>DentrixMobile300x227</image:caption><image:title>DentrixMobile300x227</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/actionable-intelligence-in-2013-action-will-define-you</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_KnowledgeDelivery2.jpg</image:loc><image:caption>emaBiContinuumKnowledgeDelivery2</image:caption><image:title>emaBiContinuumKnowledgeDelivery2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/aMiracleOccurs1.jpg</image:loc><image:caption>aMiracleOccurs1</image:caption><image:title>aMiracleOccurs1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/emaBiContinuum_ActionableIntelligence.jpg</image:loc><image:caption>emaBiContinuumActionableIntelligence</image:caption><image:title>emaBiContinuumActionableIntelligence</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/mitigate-multi-cloud-networking-complexity</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/mitigate-multi-cloud-networking-complexity.jpg</image:loc><image:caption>mitigatemulticloudnetworkingcomplexity</image:caption><image:title>mitigatemulticloudnetworkingcomplexity</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Service%20image_rs.jpg</image:loc><image:caption>Serviceimagers</image:caption><image:title>Serviceimagers</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Glass%20half%20full_RS.jpg</image:loc><image:caption>GlasshalffullRS</image:caption><image:title>GlasshalffullRS</image:title></image:image><lastmod>2023-02-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/qa-from-ema-radar-for-workload-automation-wla-q1-2016-webinar</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-dan.jpg</image:loc><image:caption>analystdan</image:caption><image:title>analystdan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy_HelpSystems2.png</image:loc><image:caption>EMASponsoredByHelpSystems2</image:caption><image:title>EMASponsoredByHelpSystems2</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/breach-detection-sony-entertainment-and-vectra-networks-</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/DMonahan.png</image:loc><image:caption>DMonahan</image:caption><image:title>DMonahan</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/ten-things-to-watch-for-in-2011</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/3-key-lessons-from-dockercon-2018-strategic-analysis-of-the-container-market-place</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/1E-image.png</image:loc><image:caption>1Eimage</image:caption><image:title>1Eimage</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Misc%20Images/Cloud_building.jpg</image:loc><image:caption>Cloudbuilding</image:caption><image:title>Cloudbuilding</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/whale-2.jpg</image:loc><image:caption>whale2</image:caption><image:title>whale2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-06-26</lastmod></url><url><loc>https://blog.enterprisemanagement.com/understanding-network-as-a-service-from-alcatel-lucent-enterprise</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/sphere-network-dots-connections-ThinkstockPhotos-2.jpg</image:loc><image:caption>spherenetworkdotsconnectionsThinkstockPhotos2</image:caption><image:title>spherenetworkdotsconnectionsThinkstockPhotos2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMA-blog-header-bg-2018.jpg</image:loc><image:caption>EMAblogheaderbg2018</image:caption><image:title>EMAblogheaderbg2018</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/iStock_000000173217XSmall.jpg</image:loc><image:caption>iStock000000173217XSmall</image:caption><image:title>iStock000000173217XSmall</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-05-15</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-hacking-a-computer-controlled-vehicle</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/hack-to-the-future.jpg</image:loc><image:caption>hacktothefuture</image:caption><image:title>hacktothefuture</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2025-04-14</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/apm-and-bsm-evolution-confusion-and-business-ownership</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-DDrogseth.png</image:loc><image:caption>EMADDrogseth</image:caption><image:title>EMADDrogseth</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2018/01/05/solve-cloud-networking-conundrum-sdwan</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/EMA-blog-header-bg-2018.jpg</image:loc><image:caption>EMAblogheaderbg2018</image:caption><image:title>EMAblogheaderbg2018</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/why-consumer-iam-is-fundamentally-different-from-traditional-iam</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_328712853-4.jpeg</image:loc><image:caption>AdobeStock3287128534</image:caption><image:title>AdobeStock3287128534</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/F5%20AWS%20small-1.jpg</image:loc><image:caption>F5AWSsmall1</image:caption><image:title>F5AWSsmall1</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AdobeStock_355254981.jpeg</image:loc><image:caption>AdobeStock355254981</image:caption><image:title>AdobeStock355254981</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2020-10-06</lastmod></url><url><loc>https://blog.enterprisemanagement.com/shamusmcgillicuddy/2015/09/09/ipv6-network-management</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/how-ddi-engineers-earn-a-seat-at-the-cloud-strategy-table</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202024-02-20%20at%201.51.05%20PM.png</image:loc><image:caption>Screenshot20240220at15105PM</image:caption><image:title>Screenshot20240220at15105PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/dynatrace-perform-2024.jpg</image:loc><image:caption>dynatraceperform2024</image:caption><image:title>dynatraceperform2024</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2024-03-12</lastmod></url><url><loc>https://blog.enterprisemanagement.com/ema-at-30-the-value-of-consistency</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-shamus.jpg</image:loc><image:caption>analystshamus</image:caption><image:title>analystshamus</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-at-30.jpg</image:loc><image:caption>emaat30</image:caption><image:title>emaat30</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ai-native-triple-threat.jpg</image:loc><image:caption>ainativetriplethreat</image:caption><image:title>ainativetriplethreat</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/AI-network-ThinkstockPhotos-647837760.jpg</image:loc><image:caption>AInetworkThinkstockPhotos647837760</image:caption><image:title>AInetworkThinkstockPhotos647837760</image:title></image:image><lastmod>2026-01-16</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-state-of-the-software-defined-data-center-2</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/SDDC-Sponsors.png</image:loc><image:caption>SDDCSponsors</image:caption><image:title>SDDCSponsors</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Photos/EMA-TVolk.png</image:loc><image:caption>EMATVolk</image:caption><image:title>EMATVolk</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/windows-10-one-year-later</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-LightCyber-125px.jpg</image:loc><image:caption>EMASponsoredByLightCyber125px</image:caption><image:title>EMASponsoredByLightCyber125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>EMASponsoredByForescout125px</image:caption><image:title>EMASponsoredByForescout125px</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/blog/the-real-reason-apple-users-are-treated-like-second-class-citizens</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Steve_Brasen.jpg</image:loc><image:caption>SteveBrasen</image:caption><image:title>SteveBrasen</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-HEAT-125px1-1.jpg</image:loc><image:caption>EMASponsoredByHEAT125px11</image:caption><image:title>EMASponsoredByHEAT125px11</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Imported_Blog_Media/EMA-SponsoredBy-Forescout-125px.jpg</image:loc><image:caption>EMASponsoredByForescout125px</image:caption><image:title>EMASponsoredByForescout125px</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://blog.enterprisemanagement.com/five-things-im-thankful-for-in-cybersecurity-this-thanksgiving</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Screenshot%202025-12-08%20at%202.36.09%20PM.png</image:loc><image:caption>Screenshot20251208at23609PM</image:caption><image:title>Screenshot20251208at23609PM</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/thanksgiving-2025.jpg</image:loc><image:caption>thanksgiving2025</image:caption><image:title>thanksgiving2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-11-27</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-asset-management-for-vulnerability-management-key-capabilities-benefits</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Axonius_Logo-2.jpg</image:loc><image:caption>AxoniusLogo2</image:caption><image:title>AxoniusLogo2</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/gluware%20featured.png</image:loc><image:caption>gluwarefeatured</image:caption><image:title>gluwarefeatured</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-cyber-security-ukraine.jpg</image:loc><image:caption>emacybersecurityukraine</image:caption><image:title>emacybersecurityukraine</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2022-02-28</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-zero-trust</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><lastmod>2025-01-24</lastmod></url><url><loc>https://blog.enterprisemanagement.com/cybersecurity-awesomeness-podcast-2025-insider-threats</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/redefining-ptaas.jpg</image:loc><image:caption>redefiningptaas</image:caption><image:title>redefiningptaas</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ken-chris-blog-photo.jpg</image:loc><image:caption>kenchrisblogphoto</image:caption><image:title>kenchrisblogphoto</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/signs-vs-microsoft-teams.jpg</image:loc><image:caption>signsvsmicrosoftteams</image:caption><image:title>signsvsmicrosoftteams</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><lastmod>2025-03-24</lastmod></url><url><loc>https://blog.enterprisemanagement.com/the-cybersecurity-impacts-of-the-nobel-prize</loc><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/Webinar%20Images/analyst%20circle%20photos/analyst-chris.jpg</image:loc><image:caption>analystchris</image:caption><image:title>analystchris</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-awesomeness-podcast.jpg</image:loc><image:caption>cybersecurityawesomenesspodcast</image:caption><image:title>cybersecurityawesomenesspodcast</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/00457c.jpg</image:loc><image:caption>00457c</image:caption><image:title>00457c</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-and-marketing-2025.jpg</image:loc><image:caption>cybersecurityandmarketing2025</image:caption><image:title>cybersecurityandmarketing2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/cybersecurity-impacts-of-nobel-prize-2025.jpg</image:loc><image:caption>cybersecurityimpactsofnobelprize2025</image:caption><image:title>cybersecurityimpactsofnobelprize2025</image:title></image:image><image:image><image:loc>https://2894142.fs1.hubspotusercontent-na1.net/hubfs/2894142/ema-logo-secondary-c.png</image:loc><image:caption>emalogosecondaryc</image:caption><image:title>emalogosecondaryc</image:title></image:image><lastmod>2025-10-13</lastmod></url></urlset>