<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.sentra.io</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/about</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/aws-partnership</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/careers</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/contact-us</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/demo</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/in-the-news</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/legal/sentra-website-terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/legal/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/solution-healthcare</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/data-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/solution-financial-services</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/data-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/legal/incentive-program-terms</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/solution-retail</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/legal/sentra-platform-terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/recorded-demo</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/microsoft-platform-support</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product/data-discovery-and-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-vs-varonis-automatic-discovery</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/aws-platform-support</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/gcp-platform-support</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/warehouse-platform-support</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/pricing</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product/limit-data-security-risks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product/least-privilege-access-control</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product/mitigate-data-security-threats</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/dev/news-dev-2</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/pages/ciso-lounge-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/legal/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-vs-cyera</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/data-subject-access-requests</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/ai-assets</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-vs-wiz-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/data-blindness</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-vs-securiti</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-vs-varonis</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-vs-concentric</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-vs-bigid</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/trust-center</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-center</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/microsoft-365-copilot-platform-support</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/salesforce-free-scan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/sentra-for-on-premises</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/microsoft-365-copilot-data-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/google-gemini-data-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/partners</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product/enterprise-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product/comprehensive-data-protection</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/product/contextual-data-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/demo-page-marketo</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/dev/form---gated-content</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/dev/form---newsletter-subscribe</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/dev/form---partner</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/dev/form---contact-us</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/dev/marketo-embed-test</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/2026-cybersecurity-budget-planning-make-data-visibility-a-priority</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/5-cybersecurity-tips-for-cybersecurity-awareness-month</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/5-key-findings-for-cloud-data-security-professionals-from-esgs-survey</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/8-holiday-data-security-tips-for-businesses</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/access-controls-that-move-the-power-of-data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/ai-data-privacy-challenges-and-tips-for-security-leaders</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/ai-governance-starts-with-data-governance-securing-the-training-data-and-agents-fuelling-genai</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/ai-in-data-security-key-risks-and-how-to-address-them</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/archive-scanning-for-cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/automating-audio-image-classification-in-unstructured-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/automating-records-of-processing-activities-ropa</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/azure-security-tools</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/best-cloud-data-security-solutions-for-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/best-data-classification-tools</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/best-dspm-tools-top-9-vendors-compared</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/best-sensitive-data-discovery-tools-in-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/building-a-better-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/building-automated-data-security-policies-for-2026-what-security-teams-need-now</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cato-xops-sentra-turning-data-intelligence-into-action</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/chatgpt-data-privacy-concerns</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/ciso-challenges-of-2025-and-how-to-overcome-them</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cloud-data-governance-is-a-security-enabler</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cloud-data-hygiene-is-an-underrated-security-enabler</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cloud-data-security-means-shrinking-the-data-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cloud-data-security-should-be-about-guardrails-not-gates</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cloud-security-tips</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cloud-vs-on-premise-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/cve-2025-53770-a-wake-up-call-for-every-sharepoint-customer</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-access-governance-tools</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-blindness-the-hidden-threat-lurking-in-your-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-context-is-the-missing-ingredient-for-security-teams</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-detection-and-response-ddr</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-loss-prevention-for-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-privacy-day-why-discovery-isnt-enough</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-security-posture-management-vs-cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/data-the-unifying-force-behind-disparate-grc-functions</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/dlp-false-positives-are-drowning-your-security-team-how-to-cut-noise-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/dspm-dirty-little-secrets-what-vendors-dont-want-you-to-test</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/dspm-for-modern-fintech-from-masking-to-ai-aware-data-protection</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/dspm-vs-dlp-vs-ddr-how-to-architect-a-data-first-stack-that-actually-stops-exfiltration</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/dwg-security-cad-data-discovery-itar</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/emerging-data-security-challenges-in-the-llm-era</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/empowering-users-to-self-protect-their-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/enhancing-ai-governance-the-crucial-role-of-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/entity-level-vs-file-level-data-classification-effective-dspm-needs-both</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/false-positives-are-killing-your-dspm-program-how-to-measure-classification-accuracy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/fiverr-data-breach-cloudinary-data-sprawl</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/florida-information-protection-act-fipa-30-day-breach-deadline</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/future-of-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/gcp-security-tools</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/gdpr-compliance-failures-lead-to-surge-in-fines</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/global-travel-platform-secures-petabytes-of-cloud-data-in-30-days</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-cisos-will-evaluate-dspm-in-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-contextual-data-classification-complements-your-existing-dlp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-does-dspm-safeguard-your-data-when-you-have-cspm-cnapp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-modern-data-security-discovers-sensitive-data-at-cloud-scale</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-pci-dss-4-0-improves-your-security-posture</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-sensitive-cloud-data-gets-exposed</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-sentra-is-redefining-data-security-at-black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-sentra-uncovers-sensitive-data-hidden-in-atlassian-products</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-sentras-mcp-server-turns-dspm-into-an-ai-driven-security-operations-platform</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-the-tea-app-got-blindsided-on-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-choose-a-data-access-governance-tool</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-meet-the-security-challenges-of-hybrid-data-environments</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-prevent-data-breaches-in-healthcare-and-protect-phi</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-protect-sensitive-data-in-aws</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-protect-sensitive-data-in-azure</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-protect-sensitive-data-in-gcp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-scale-dsar-compliance-without-breaking-your-team</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/how-to-supercharge-microsoft-purview-dlp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/if-you-could-only-ask-one-question-about-your-data-it-should-be-this</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/its-time-to-embrace-cloud-dlp-and-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/key-practices-for-responding-to-compliance-framework-updates</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/manage-compliance-risks-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/meet-sentra-at-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/mergers-and-acquisitions-integration-challenges</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/microsoft-copilot-chat-incident</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/minimizing-your-data-attack-surface-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/my-journey-to-empower-women-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/mythos-is-already-here-the-question-is-what-attackers-will-find</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/new-ai-assistant-sentra-jagger-is-a-game-changer-for-dspm-and-ddr</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/new-healthcare-cyber-regulations-what-security-teams-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/nydfs-new-cybersecurity-requirements-and-enforcement</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/one-platform-to-secure-all-data-moving-from-data-discovery-to-full-data-access-governance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/openclaw-moltbot-the-ai-agent-security-crisis-enterprises-must-address-now</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/overcoming-gartners-obstacles-for-dspm-mass-adoption</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/patchwork-ai-security-vs-purpose-built-protection-thoughts-on-cyeras-ryft-acquisition</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/pdf-scanning-for-data-security-why-you-cant-treat-pdfs-as-a-second-class-citizen</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/retail-data-breaches-how-to-secure-customer-data-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/rising-to-the-challenge-of-data-security-leadership</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/safeguarding-data-integrity-and-privacy-in-the-age-of-ai-powered-large-language-models-llms</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/secs-cybersecurity-and-incident-disclosure-rules</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/secure-ai-adoption-for-enterprise-data-protection-are-you-prepared</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/securing-shadow-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/securing-the-cloud-advanced-strategies-for-continuous-data-monitoring</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/securing-unstructured-data-in-microsoft-365-the-case-for-petabyte-scale-ai-driven-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/securing-your-microsoft-365-environment-with-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-achieves-tx-ramp-certification-demonstrating-leadership-in-data-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-arrives-in-the-us-announces-new-technology-partnership-with-wiz</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-featured-in-gartners-2023-hype-cycle-for-data-security-for-second-consecutive-year</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-integrates-with-amazon-security-lake</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-is-one-of-the-hottest-cybersecurity-startups</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-named-a-representative-vendor-in-gartners-innovation-insight-data-security-posture-management-report</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-now-supports-solidworks-3d-cad-files-protecting-the-digital-blueprint-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-on-the-road-where-to-find-us-this-october</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-q2-2026-ai-data-security-hybrid-coverage-dlp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentra-raises-30m-series-a-to-lead-the-data-centric-approach-to-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sentras-3-year-journey-from-dspm-to-data-security-platform</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/soc-2-without-the-spreadsheet-chaos-automating-evidence-for-regulated-data-controls</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sofis-cloud-data-security-journey-with-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/specialized-file-format-scanning</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/spooky-stories-of-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/sqlite-and-sql-dump-scanning-for-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/structured-data-file-scanning</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/the-blind-spot-in-your-data-lake</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/the-hidden-risks-metadata-catalogs-cant-see</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/the-importance-of-data-security-for-growth-a-blueprint-for-innovation</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/the-instructure-breach-was-salesforce-again-heres-the-governance-problem-nobody-is-talking-about</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/the-need-for-continuous-compliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/the-rise-of-next-generation-dsps</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/thinking-beyond-policies-ai-ready-data-protection</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/third-party-oauth-apps-are-the-new-shadow-data-risk-lessons-from-the-gainsight-salesforce-incident</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/thoughts-on-sentra-and-the-data-security-landscape-after-our-series-a</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/three-ways-dspm-reduces-the-risk-of-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/top-advantages-and-benefits-of-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/top-data-security-resolutions</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/transforming-data-security-with-large-language-models-llms-sentras-innovative-approach</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/types-of-sensitive-data-what-cloud-security-teams-should-know</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/understanding-data-movement-to-avert-proliferation-risks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/understanding-the-ftc-data-breach-reporting-requirements</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/understanding-the-value-of-dspm-in-todays-cloud-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/unstructured-data-is-80-of-your-risk-why-your-dspm-fails-at-petabyte-scale</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/us-state-privacy-laws-2026-dspm-compliance-requirements-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/use-redshift-data-scrambling-for-additional-data-protection</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/web-archive-scanning</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/what-cisos-learned-in-2025-the-5-data-security-priorities-coming-in-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/what-is-data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/what-the-hipaa-compliance-updates-mean-for-your-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-audio-and-video-files-are-your-next-big-risk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-data-is-the-new-center-of-gravity-in-a-connected-cloud-security-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-dspm-should-take-a-slice-of-your-2024-cyber-security-budget</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-i-joined-sentra-a-data-defenders-journey</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-infrastructure-security-is-not-enough-to-protect-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-its-time-to-adopt-a-data-centric-approach-to-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-legacy-data-classification-tools-dont-work-well-in-the-cloud-but-dspm-does</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-sentra-was-named-gartner-peer-insights-customer-choice-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/why-we-built-chatdlp-because-banning-productivity-tools-isnt-the-answer</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/your-ai-is-only-as-secure-as-your-data-celebrating-a-100m-milestone</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/blog/your-data-lakehouse-is-now-your-ai-data-plane-is-the-governance-designed-in</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/addressing-gartners-dspm-obstacles</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/ai-classification-unstructured-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/benny-bloch-ciso-at-global-e-why-global-e-chose-sentras-ds</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/breaking-news-the-rise-of-data-blindness</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/building-a-successful-dspm-program</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/cloud-fauda-a-discussion-of-cloud-data-security-chaos-with-asaf-kochan-and-jason-chan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/connecting-your-cloud-accounts-to-sentra-for-robust-data-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/cybersecurity-experts-answer-users-top-questions-part-iii</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/data-centric-vs-infrastructure-centric-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/data-lifecycle-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/feel-secure-again-the-future-of-dspm-youll-want-in-your-stack-asaf-kochan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/gigaom-webinar-securing-data-everywhere-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/global-es-path-to-stronger-data-security-with-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/guardians-of-the-data-episode-2-ensuring-business-alignment-in-data-security-rick-deloach</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/guardians-of-the-data-episode-3-rick-mcelroy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/guardians-of-the-data-episode-4</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/guardians-of-the-data-episode-6-cybersecuritys-weakest-link-human-risk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/how-sofi-raises-the-bar-on-data-security-with-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/how-to-detect-incidents-early-and-prevent-catastrophic-data-loss</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/how-to-detect-similar-data-movement</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/how-to-ensure-data-regulatory-compliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/how-to-minimize-breach-impact-with-least-privilege-access</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/how-to-reduce-your-data-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/qoria-ciso-on-automating-ropa-gdpr-data-governance-across-cloud-accounts</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/secure-sensitive-data-at-scale-with-sentra-dspm-on-aws</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/sentra-experts-answer-the-most-searched-dspm-questions</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/sentra-experts-answer-users-top-questions</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/sentra-jagger-industry-first-generative-ai-assistant-for-cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/sentra-platform-overview-video</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/sentra-the-cure-for-data-blindness</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/shrinking-the-data-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/sofi-dspm-webinar</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/the-challenge-of-data-movement</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/the-data-challenge-facing-security-teams</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/the-evolution-of-data-security-where-dspm-is-headed-next</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/webinar-recording-data-security-is-different-at-the-petabyte-scale</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/webinar-recording-etls-pipelines-and-migrations-cloud-data-is-literally-a-moving-target</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/webinar-recording-how-to-leverage-data-centric-security-controls-in-aws</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/webinar-recording-reducing-compliance-risks-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/webinar-recording-securing-ai-agents-and-preventing-data-exposure-in-genai-workflows</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/webinar-recording-sofis-dspm-story</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/what-is-data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/what-should-cisos-be-prioritizing</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/videos/whats-the-difference-between-cspm-and-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/aarti-gadhia</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/adi-voulichman</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/alejandro-hernandez</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/alex-molotsky</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/ariel-rimon</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/asaf-kochan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/aviv-zisso</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/catherine-gurwitz</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/charles-garlow</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/daniel-suissa</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/david-stuart</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/david-trigano</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/dean-taler</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/elie-perelman</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/galia-nedvedovich</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/gilad-golani</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/guy-spilberg</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/haim-roth</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/hanan-zaichyk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/jason-chan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/jonathan-kreiner</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/kristin-grimes</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/linoy-levy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/lior-rapoport</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/mark-kiley</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/meitar-ghuy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/meni-besso</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/nikki-ralston</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/noa-sheffer</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/ofir-yehoshua</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/ran-shister</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/romi-minin</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/ron-reiter</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/roy-degani</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/roy-levine</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/ryda-stegenga</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/sapir-gottdiner</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/shiri-nossel</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/team-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/veronica-marinov</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/ward-balcerzak</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/yair-cohen</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/yoav-regev</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/our-data-security-experts/yogev-wallach</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/access-control-list-acl</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/access-controls</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/advanced-encryption-standard</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/advanced-persistent-threat-apt</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/ai-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-athena</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-aurora</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-cloudwatch</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-cognito</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-detective</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-ebs</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-ec2</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-elastic-file-system-efs</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-inspector</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-keyspaces</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-lightsail</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-macie</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-neptune</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-quantum-ledger-database</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-redshift</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-route-53-resolver-dns-firewall</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-s3</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-timestream</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/amazon-web-application-firewall</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/anti-virus</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/authentication</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/authorization</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-artifact</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-audit-manager</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-backup</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-certificate-manager</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-cloudhsm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-config</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-elastic-beanstalk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-elastic-disaster-recovery</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-firewall-manager</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-iam</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-lambda</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-network-firewall</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-organizations</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-private-certificate-authority</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-resource-access-manager</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-security-hub</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-shield</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/aws-storage-gateway</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-ad</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-ad-ds</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-app-configuration</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-archive-storage</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-backup</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-blob-storage</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-data-box</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-data-lake-storage</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-ddos-protection</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-disk-storage</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-files</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-firewall-manager</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-key-vault</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/azure-netapp-files</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/binary-authorization</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/cache-poisoning</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/california-consumer-privacy-act-ccpa</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/california-privacy-rights-act-cpra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/chronicle-security-operations</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/cloud-detection-and-response-cdr</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/cloud-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/cloud-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/container-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/continuity-of-operations-plan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/cyphertext</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-access-governance-dag</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-detection-and-response-ddr</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-encryption-standard</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-engineering</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-integrity</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-lake</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-lineage</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-localization</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-mining</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-science</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-sprawl</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/data-warehouse</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/devops</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/dynamodb</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/encryption</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/gcp-access-transparency-and-access-approval</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/gcp-secrets-manager</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/gdpr</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/google-advanced-protection-program</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/google-assured-workloads</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/google-cloud-firewall</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/google-cloud-platform</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/hipaa</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/homomorphic-encryption</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/hybrid-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/iaas</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/knative</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/kubernetes</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/large-language-models-llms</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/mean-time-to-resolve-mttr</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/microsoft-azure-bastion</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/microsoft-defender-external-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/microsoft-defender-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/model-context-protocol-mcp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/mongodb</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/next-gen-antivirus</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/nist-ai-risk-management-framework</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/paas</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/packet-mirroring</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/personally-identifiable-information-pii</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/private-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/protected-healthcare-information-phi</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/public-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/records-of-processing-activities-ropa</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/role-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/saas-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/sarbanes-oxley-act-of-2002</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/security-and-information-event-management-siem</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/security-operation-center-soc</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/security-orchestration-automation-and-response-soar</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/shadow-ai</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/shadow-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/shielded-vms</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/software-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/cloud-data-security-glossary/virtual-private-cloud-vpc</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/adi-voulichman</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/akiva-avros</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/alex-molotsky</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/amit-arie</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/anastasia-shapiro-briskman</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/aviv-zisso</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/coral-avitan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/daniel-suissa</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/david-stuart</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/dean-taler</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/ehood-goren</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/galia-nedvedovich</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/hanan-zaichyk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/kristin-grimes</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/martin-miller</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/may-bohadana</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/meni-besso</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/omri-limor</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/ran-shister</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/ron-reiter</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/employees/tali-naveh</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/a-dspm-early-adopter-shares-his-experience</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/api-cybersecurity-conference-for-the-oil-and-natural-gas-industry</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/aws-re-inforce-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/aws-re-invent</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/black-hat-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/chicago-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/cloud-and-data-security-summit-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/cyberrisk-charlotte-leadership-exchange-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/cyberrisk-seattle-leadership-exchange</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/cyphercon-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/dallas-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/data-security-is-different-at-the-petabyte-scale</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/dinner-and-drinks-with-sofi-ciso-hilik-kotler</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/discover-data-lifecycle-security-at-aws-re-inforce-2023</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/evanta-ciso-dinner-in-boston</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/evanta-ciso-dinner-in-minneapolis</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/evanta-session-host-dallas-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/evanta-session-host-seattle-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/exclusive-dinner-and-drinks-at-black-hat</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/executive-dinner-in-charlotte</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/fs-isac-2024-americas-spring-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/futurecon-detroit-cybersecurity-conference</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/gartner-security-risk-management-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/gartner-security-risk-management-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/gartner-symposium</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/generative-ais-role-in-next-gen-cyber-wars</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/guidepoint-security-chicago</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/guidepoint-security-cko-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/h-isac-spring-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/hartford-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/infosec-world-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/infosec-world-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/innovate-cybersecurity-summit-marco-island</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/innovate-nashville-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/innovate-nashville-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/innovate-peer-panel-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/innovate-scottsdale-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/july-partner-power-webinar-cspm-and-application-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/live-webinar-shift-gears-how-to-leverage-data-centric-security-controls-in-aws</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/meet-sentra-at-cyber-week-tel-aviv</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/meet-sentra-at-fs-isac</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/meet-sentra-at-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/millenium-alliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/new-york-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/rsa-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/rsac-ciso-command-center-powered-by-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/savor-the-summit-executive-dinner-at-gartner-security-risk-management-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/secureworld-boston</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/secureworld-boston-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/secureworld-philadelphia</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/sentra-webinar-reducing-compliance-risks-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/sentra-webinar-securing-ai-agents-and-preventing-data-exposure-in-genai-workflows</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/sinet-ny-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/sinet-webinar</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/the-evolution-of-data-security-where-dspm-is-headed-next</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/the-women-in-security-documentary-premiere</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/the-women-in-security-documentary-rsac</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/trace3-evove-technology-conference</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/transformational-ciso-assembly-by-the-millennium-alliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/transformational-ciso-assembly-by-the-millennium-alliance-austin</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/vr-experience-with-defy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/wall-street-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/events/webinar-recording-shift-gears-how-to-leverage-data-centric-security-controls-in-aws</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/a-security-practitioners-guide-to-ai-data-readiness</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/chicago-ciso-dinner</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/contact-us</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/default-thank-you</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/demo</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/dspm-dirty-little-secrets</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/excited-to-see-you-at-black-hat</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/excited-to-see-you-in-san-diego</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/excited-to-see-you-in-seattle</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/executive-dinner-in-charlotte</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/free-scan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/gartner-2025-voice-of-the-customer-for-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/gartner-innovation-insight-report-for-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/gdpr-compliance-guide-thank-you</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/heres-your-copy-of-the-sentra-technology-overview</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/hype-cycle-for-data-security-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/interactive-demo</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/jason-chans-buyers-guide-for-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/looking-forward-to-seeing-you-at-the-sofi-webinar</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/m365-copilot</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/meet-sentra-at-fs-isac</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/meet-sentra-at-rsa-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/mitre-attck</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/partner</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/personal-demo</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/recorded-demo</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/rsa-2023</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/rsa-2023-happy-hour</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/sage-council-2023</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/see-you-at-black-hat</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/see-you-at-black-hat-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/sentra-poc</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/sharepoint-zero-day</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/thank-you-your-rsac-2025-registration-is-confirmed</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/thanks-for-registering-for-the-webinar</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/thanks-for-signing-up-for-a-meeting-at-aws-re-inforce</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/thanks-for-your-interest-in-meeting-sentra-at-cyber-week-tel-aviv</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/the-guide-to-empowering-your-security-stack-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/your-copy-of-the-gigaom-dsp-report</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/your-copy-of-the-gigaom-dspm-report</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/your-copy-of-the-gigaom-dspm-report-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/your-copy-of-the-rfp-for-data-security-platforms-template</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/thank-you/your-recording-of-sofis-dspm-journey</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/2025-gartner-peer-insights-voice-of-the-customer-for-dspm-bigid</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/2025-gartner-peer-insights-voice-of-the-customer-for-dspm-concentric</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/2025-gartner-peer-insights-voice-of-the-customer-for-dspm-cyera</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/2025-gartner-peer-insights-voice-of-the-customer-for-dspm-securiti</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/2025-gartner-peer-insights-voice-of-the-customer-for-dspm-symmetry-systems</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/2025-gartner-peer-insights-voice-of-the-customer-for-dspm-varonis</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/checklist-how-sentra-dspm-neutralizes-sharepoint-zero-day-risk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/dspm-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/dspm-dirty-little-secrets</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/gigaom-radar-for-data-security-platforms-dsp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/how-dspm-empowers-your-entire-security-stack</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/how-sentra-supports-gdpr-compliance-in-modern-cloud-ai-environments</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/mapping-dspm-to-the-mitre-attack-framework</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/securing-sensitive-data-starts-with-discovery-and-classification-sofis-dspm-story</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/security-practitioners-guide-to-ai-data-readiness</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/reports/sentra-named-a-customers-choice-in-2025-gartner-peer-insights</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/10-cool-new-data-security-products-in-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/2024-predictions-from-top-cyber-experts</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/2025-sc-awards-finalists-best-data-security-solution</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/23andme-bankruptcy-raises-concerns-over-fate-of-customer-genetic-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/3-reasons-to-consider-a-dspm-platform</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/ai-cloud-security-tools-explode</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/ai-in-the-cloud-the-rising-tide-of-security-and-privacy-risks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/aithority-interview-ai-journey</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/aithority-interview-with-yoav-regev-ceo-and-co-founder-at-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/artificial-intelligence-ai-as-an-enabler-for-enhanced-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/bringing-the-cyber-community-into-the-battle-against-agentic-insecurity-at-rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/building-with-genai-heres-why-regulated-data-needs-a-new-playbook</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/chatdlp-anonymizer-redacts-sensitive-information-from-chatgpt-and-google-bard-prompts</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/cloud-security-risks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/cohesity-forms-industrys-largest-alliance-of-dspm-vendors-to-reduce-customer-risks-of-cloud-transformation-and-data-democratization</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/companies-explore-ways-to-safeguard-data-in-the-age-of-llms</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/compliance-challenges-in-2023</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/concerns-over-ai-data-quality-gives-new-meaning-to-the-phrase-garbage-in-garbage-out</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/data-blindness-is-the-silent-threat-undermining-ai-security-and-operational-resilience</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/data-first-culture-20-top-challenges-and-expert-solutions</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/data-privacy-day-2026-industry-experts-weigh-in-on-ai-governance-zero-trust-and-the-evolving-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/data-security-and-the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/data-security-posture-management-dspm-explained</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/data-security-startup-sentra-launches-in-u-s-market</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/data-security-the-foundation-of-responsible-ai-regulation</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/docontrol-and-sentra-join-forces-to-close-the-gap-between-data-insight-and-control</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/dont-ignore-the-security-risks-of-limitless-cloud-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/duns100-named-sentra-in-best-startup-companies</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/exposed-without-a-breach-the-cost-of-data-blindness</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/feel-secure-again-the-future-of-dspm-youll-want-in-your-stack---asaf-kochan</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/flipping-the-script-the-premiere-of-the-women-in-security-documentary-at-rsac</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/focal-infra-the-nyc-tech-leaders-reshaping-the-way-we-build</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/four-risks-to-consider-before-using-chatgpt-for-security-operations</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/fueling-the-future-of-ai-data-security---sentras-50m-series-b-and-whats-next-with-sentras-yoav-regev</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/getting-a-grip-on-data-sprawl</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/getting-ready-for-hipaa-2-0-what-the-new-compliance-updates-mean-for-security-teams</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/github-action-bug-allows-supply-chain-attack-added-to-cisa-list</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/hacker-conversations-ron-reiter-and-the-making-of-a-professional-hacker</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/hackers-use-chat-gpt</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/harnessing-genai-to-strengthen-data-security-for-third-party-risks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/healthcare-cybersecurity-to-safeguard-phi-and-avoid-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/heard-on-the-street</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-ai-is-transforming-data-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-healthcare-organizations-can-deploy-data-security-more-holistically-to-prevent-third-party-breaches</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-organizations-can-save-cisos-amidst-increasing-federal-regulations</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-sentra-manages-data-workflows-using-amazon-eks-dagster-and-karpenter</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-to-effectively-prep-your-team-for-zero-day-attacks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-to-get-your-failing-data-governance-initiatives-back-on-track</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-to-protect-privacy-and-build-secure-ai-products</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/how-to-thoroughly-monitor-and-protect-software-supply-chains</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/increased-gdpr-enforcement-highlights-the-need-for-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/its-time-to-establish-the-nato-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/mapping-israels-genai-security-pioneers</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/middle-east-crisis-understanding-the-potential-threats-and-how-the-cybersecurity-industry-can-take-action</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/midmarket-cio-priorities-for-2026---why-ai-cant-move-faster-than-your-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/miggo-and-sentra-unite-to-deliver-the-worlds-first-adr-dspm-integration-for-complete-security-context</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/mongodb-building-for-flexibility-visibility-and-scale</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/navigating-the-complexity-of-the-latest-data-privacy-regulations</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/qantas-data-breach-exposes-millions-a-wake-up-call-on-pii-blind-spots</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/rsa-conference-2024-announcements-summary</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/saying-were-100-secure-is-not-the-problem</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/security-teams-need-to-prioritize-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sensitive-data-discovery-expert-steps-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-2025-predictions-ai-is-the-catalyst-for-data-security-evolution</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-adds-advanced-ddr-solution-to-data-security-platform</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-and-miggo-launch-industry-first-adr-dspm-integration-to-unify-application-and-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-announces-industry-first-generative-ai-assistant-for-cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-announces-integration-with-amazon-security-lake-to-enhance-enterprises-ability-to-protect-critical-business-data-assets</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-announces-integration-with-microsoft-365-to-discover-and-resolve-data-risks-across-multi-cloud-and-on-prem-environments</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-announces-integrations-with-microsoft-purview-information-protection-and-jupiterone</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-announces-new-integrations-with-check-point-threatcloud-ai-and-cloudguard</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-appoints-ambassador-dan-gillerman-to-advisory-board</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-appoints-ward-balcerzak-as-field-ciso-to-advance-enterprise-data-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-assessing-and-monitoring-data-security-including-ai</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-closes-50-million-series-b-amid-surging-demand-for-securing-data-for-ai-adoption</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-earns-top-honors-for-data-security-from-five-leading-award-programs</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-empowers-enterprises-to-curb-data-risks-at-scale-with-addition-of-large-language-models-to-classification-engine</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-exec-discusses-international-cybersecurity-perspectives</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-expands-data-security-capabilities-to-tackle-rapid-data-sprawl-across-the-entire-data-estate</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-expands-data-security-platform-with-on-premises-scanners-for-hybrid-and-private-environments</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-helps-enterprises-get-full-visibility-and-control-over-their-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-integrates-with-wiz-to-discover-prioritize-and-eliminate-cloud-and-ai-data-risk-2</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-introduces-data-security-for-ai-agents-solution</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-is-a-finalist-for-the-2024-tech-innovators-awards</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-jagger-industry-first-generative-ai-assistant-for-cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-jagger-provides-real-time-security-insights-and-ai-assisted-remediation-guidelines</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-joins-aws-isv-accelerate-program</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-joins-cloud-security-alliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-launches-automated-dsar-capability-to-accelerate-privacy-compliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-launches-breakthrough-unstructured-data-ai-classification-capabilities-to-accelerate-secure-genai-adoption</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-launches-chatdlp-anonymizer-browser-extension-to-avoid-sensitive-data-leaks-in-public-language-models</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-launches-microsoft-365-copilot-security-to-safeguard-sensitive-enterprise-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-launches-the-only-scalable-google-workspace-gemini-security-to-protect-sensitive-data-from-ai-risk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-2024-stellar-startup-security-vendor</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-a-2025-cyber-top-company-by-enterprise-security-tech</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-a-customers-choice-in-2025-gartner-peer-insights-voice-of-the-customer-dspm-report</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-a-leader-and-outperformer-in-2024-gigaom-radar-for-data-security-platforms</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-a-leader-in-2024-gigaom-radar-for-data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-as-a-sample-vendor-in-the-2024-gartner-hype-cycle-for-cyber-risk-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-finalist-in-foundrys-2025-infoworld-technology-of-the-year-awards</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-hottest-cloud-and-ai-security-startup-of-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-hottest-cloud-security-startup-company-of-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-leader-in-gigaom-radar-for-dspm-for-second-consecutive-year</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-most-interesting-product-to-see-at-rsa-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-one-of-the-best-startups-to-work-for-by-duns-100</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-top-data-security-startups-to-watch-in-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-named-winner-of-crn-tech-innovators-award</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-raises-30-million-series-a-financing-to-meet-growing-demand-for-data-security-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-recognized-as-crn-r-2024-stellar-startup</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-shortlisted-for-the-2025-26-cloud-awards</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-showcases-small-language-model-capabilities-with-ai-classifier-for-unstructured-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-strengthens-advisory-board-with-appointment-of-fortune-500-security-leader-shaun-marion</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-strengthens-executive-team-with-appointment-of-gil-segev-to-vp-sales</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-wins-global-infosec-award-for-cutting-edge-data-security-platform</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentra-wins-intellyx-digital-innovator-award-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentras-cloud-security-solution---sentra-yoav-regev</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/sentras-industry-first-generative-ai-assistant-for-cloud-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/shining-light-on-artificial-intelligence-netapp-to-mentor-five-new-startups-under-netapp-excellerator</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-10-hottest-cloud-security-startup-companies-of-2023</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-10-hottest-cybersecurity-startups-of-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-20-coolest-identity-access-and-data-security-companies-of-2026</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-2025-dspm-power-list-7-platforms-that-actually-reduce-data-risk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-50-most-promising-israeli-startups-2023</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-emerging-world-of-data-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-future-of-enterprise-protection-integrated-data-security-platforms</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-hottest-cybersecurity-startups-of-2025</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-inclusion-imperative-the-women-in-security-documentary</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-mother-of-all-breaches-navigating-the-aftermath-and-fortifying-your-data-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-new-era-of-dynamic-cloud-data-addressing-the-security-challenge</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-rising-influence-of-ai-on-the-2024-us-election</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/the-weakest-link-in-the-chain-sounding-the-alarm-on-aging-infrastructure-it-systems</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/top-10-most-watched-cyber-tech-companies</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/top-12-data-security-posture-management-tools</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/top-14-data-security-posture-management-dspm-tools</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/top-cybersecurity-startups-to-watch-from-rsac-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/top-israeli-startups-to-watch-in-2024</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/transform-your-data-security-posture-sofis-dspm-success</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/two-years-after-colonial-pipeline-what-have-we-learned</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/understanding-the-future-era-of-artificial-general-super-intelligence</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/what-is-data-security-posture-management-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/when-copilot-can-see-too-much-why-ai-security-starts-with-data-governance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/why-2026-is-the-year-cloud-migration-accelerates-with-confidence</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/yoav-regev-ceo-and-co-founder-of-sentra-interview-series</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/yoav-regev-on-raising-over-100-million-to-build-a-cloud-native-data-security-platform-dsp-dspm-to-help-organizations-secure-sensitive-data-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/news/you-cant-secure-what-you-cant-see-ais-data-dilemma</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/bigbasket-reduces-risks-and-costs-in-aws-with-sentra</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/how-a-consumer-app-company-secured-over-130-petabytes-in-weeks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/how-a-mortgage-lender-ensures-sensitive-data-gets-masked-and-stays-masked</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/papaya-global-embraces-a-data-centric-approach-to-enforce-data-security-policies</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/protect-your-secret-sauce-safeguard-critical-ip-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/securing-petabytes-at-scale-global-travel-platform-gained-control-of-its-cloud-data-in-just-30-days</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/unifying-cloud-data-risk-with-wiz-sentra-how-a-digital-bank-detects-exposure-and-prioritizes-real-risk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/case-studies/unifying-multi-cloud-data-security-with-sentra-how-valenz-health-scaled-phi-protection-post-merger</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/data-security-posture-management/dspm-use-cases</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/data-security-posture-management/dspm-vs-cspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/5-data-classification-challenges-that-security-teams-face</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/achieving-ai-ready-data-security-with-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/achieving-exabyte-scale-enterprise-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/ai-balancing-innovation-with-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/automated-data-classification-the-foundation-for-scalable-data-security-privacy-and-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/aws-security-groups</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/best-practices-automatically-tag-and-label-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/bigid-alternatives-7-modern-dspm-platforms-compared</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/bigid-vs-sentra-a-cloud-native-dspm-built-for-security-teams</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/cloud-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/cloud-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/create-an-effective-rfp-for-a-data-security-platform-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/data-leakage-detection-for-aws-bedrock</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/data-protection-and-classification-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/data-security-for-georgia-fintechs-breach-laws-and-regs</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/data-security-southeast-healthcare-finance-insurance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/dspm-vs-legacy-data-tools</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/email-dlp-beyond-the-gateway-why-email-archive-scanning-has-to-be-part-of-your-dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/enterprise-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/eu-ai-act-compliance-what-enterprise-ai-deployers-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/eu-us-data-privacy-framework-101</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/evaluate-dspm-dlp-copilot-gemini</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/fipa-vs-hipaa-florida-healthcare-data-breach-obligations</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/gdpr-audit-evidence</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/georgia-data-breach-notification-law-10-1-912</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/ghosts-in-the-model-uncovering-generative-ai-risks</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/hipaa-north-carolina-identity-theft-protection-act-a-data-security-guide-for-hospitals-and-health-systems</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/how-sentra-accurately-classifies-sensitive-data-at-scale</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/how-sentra-built-a-data-security-platform-for-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/how-to-secure-data-in-snowflake</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/how-to-write-an-effective-data-security-policy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/jupyter-notebook-scanning-the-data-science-blind-spot-leaking-your-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/modern-dlp-strategy-dspm-endpoint-cloud-dlp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/north-carolina-data-breach-notification-law-requirements</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/over-permissioned-access</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/pii-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/private-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/real-time-data-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/s3-bucket-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/securing-sensitive-data-in-google-cloud-sentra-data-security-for-modern-cloud-and-ai-environments</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/sensitive-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/sentra-mcp-server-ai-driven-data-security-operations</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/source-code-secrets-scanning-the-missing-half-of-your-cloud-data-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/south-carolina-data-breach-notification-law-requirements</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/south-carolina-insurance-data-security-act-requirements</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/southeast-data-breach-laws-compared-nc-sc-ga-fl</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/supercharging-dlp-with-automatic-data-discovery-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/learn/why-dspm-is-the-missing-link-to-faster-incident-resolution-in-data-security</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/ai-ml</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/analyst-report</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/article</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/breach</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/case-study</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/compliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/customer-testimonial</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/ddr</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/discovery-and-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/dlp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/dsp</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/dspm</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/finance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/guide</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/healthcare</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/identity-dag</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/insurance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/m-a</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/podcast</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/privacy</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/retail</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/risk</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/shadow-data</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/solution-overview</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/traveltech</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/use-case</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/video</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/webinar</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/resource-tags/whitepaper</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/cyber-security-resilience</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/data-privacy-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/data-sprawl</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/m365-copilot-adoption</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/prevent-sensitive-data-exposure</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/secure-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/use-cases/unstructured-data-classification</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/launch-events/ai-data-readiness-dinner</loc>
    </url>
    <url>
        <loc>https://www.sentra.io/launch-events/seattle-ciso-executive-dinner-april-2026</loc>
    </url>
</urlset>