<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyberark.integritypartners.pl/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyberark.integritypartners.pl/o-cyberark/cybrerark-logo-big/#main</loc>
		<lastmod>2015-08-12T14:07:57+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/cybrerark-logo-big.png</image:loc>
			<image:title><![CDATA[Systemy bezpieczeństwa CyberArk]]></image:title>
			<image:caption><![CDATA[Systemy bezpieczeństwa CyberArk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/strona-glowna/cyber-sliders4/#main</loc>
		<lastmod>2015-08-18T13:35:01+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Cyber-sliders4.png</image:loc>
			<image:title><![CDATA[Bezpieczeństwo z CyberArk]]></image:title>
			<image:caption><![CDATA[Bezpieczeństwo z CyberArk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-account-security-solution/cyberark-pass/#main</loc>
		<lastmod>2015-08-19T11:26:29+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/CyberArk-PASS.png</image:loc>
			<image:title><![CDATA[CyberArk Privileged Account Security Solution]]></image:title>
			<image:caption><![CDATA[CyberArk Privileged Account Security Solution]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/enterprise-password-vault/enterprise-password-vault-1/#main</loc>
		<lastmod>2015-08-25T10:37:31+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Enterprise-Password-Vault-1.png</image:loc>
			<image:title><![CDATA[Enterprise Password Vault obsługiwane urządzenia]]></image:title>
			<image:caption><![CDATA[Enterprise Password Vault obsługiwane urządzenia]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/application-identity-manager/aim/#main</loc>
		<lastmod>2015-08-25T13:15:18+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/AIM.png</image:loc>
			<image:title><![CDATA[CyberArk AIM]]></image:title>
			<image:caption><![CDATA[CyberArk AIM]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/enterprise-password-vault/epv/#main</loc>
		<lastmod>2015-08-25T13:18:44+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/EPV.png</image:loc>
			<image:title><![CDATA[CyberArk EPV]]></image:title>
			<image:caption><![CDATA[CyberArk EPV]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/ssh-key-manager/cyberark-ssh-key-manager/#main</loc>
		<lastmod>2015-09-28T11:36:51+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/CyberArk-SSH-Key-Manager.png</image:loc>
			<image:title><![CDATA[CyberArk SSH Key Manager]]></image:title>
			<image:caption><![CDATA[CyberArk SSH Key Manager]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/sensitive-information-management-solution/cyberark-sensitive-information-management-solution/#main</loc>
		<lastmod>2015-09-28T12:06:55+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/CyberArk-Sensitive-Information-Management-Solution.png</image:loc>
			<image:title><![CDATA[CyberArk Sensitive Information Management Solution]]></image:title>
			<image:caption><![CDATA[CyberArk Sensitive Information Management Solution]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/sensitive-information-management-solution/sensitive-information-management-solution-chart/#main</loc>
		<lastmod>2015-09-28T15:15:10+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Sensitive-Information-Management-Solution-Chart.png</image:loc>
			<image:title><![CDATA[Sensitive Information Management Solution schemat]]></image:title>
			<image:caption><![CDATA[Sensitive Information Management Solution schemat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/enterprise-password-vault/enterprise-password-vault-2/#main</loc>
		<lastmod>2015-09-30T10:20:37+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Enterprise-Password-Vault.png</image:loc>
			<image:title><![CDATA[Privileged Access Management]]></image:title>
			<image:caption><![CDATA[Privileged Access Management]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-threat-analytics/privileged-threat-analytics-diagram/#main</loc>
		<lastmod>2015-09-30T10:36:06+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Threat-Analytics-diagram.png</image:loc>
			<image:title><![CDATA[Privileged Threat Analytics diagram]]></image:title>
			<image:caption><![CDATA[Privileged Threat Analytics diagram]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/on-demand-privileges-manager/on-demand-privileges-manager/#main</loc>
		<lastmod>2015-09-30T12:25:46+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/On-Demand-Privileges-Manager.png</image:loc>
			<image:title><![CDATA[On-Demand Privileges Manager]]></image:title>
			<image:caption><![CDATA[On-Demand Privileges Manager]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-threat-analytics/privileged-threat-analytics-2/#main</loc>
		<lastmod>2015-09-30T12:38:44+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Threat-Analytics.png</image:loc>
			<image:title><![CDATA[Privileged Threat Analytics]]></image:title>
			<image:caption><![CDATA[Privileged Threat Analytics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-session-manager/privileged-session-manager/#main</loc>
		<lastmod>2015-09-30T12:46:16+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Session-Manager.png</image:loc>
			<image:title><![CDATA[Privileged Session Manager]]></image:title>
			<image:caption><![CDATA[Privileged Session Manager]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-account-security-solution/privileged-account-security-solution-2/#main</loc>
		<lastmod>2015-09-30T14:04:39+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Privileged-Account-Security-Solution.png</image:loc>
			<image:title><![CDATA[Privileged Account Security Solution]]></image:title>
			<image:caption><![CDATA[Privileged Account Security Solution]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/cyberark-finalizuje-przejecie-viewfinity/viewfinity/#main</loc>
		<lastmod>2015-11-12T12:45:19+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/ViewFinity.png</image:loc>
			<image:title><![CDATA[ViewFinity]]></image:title>
			<image:caption><![CDATA[ViewFinity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/strona-glowna/sims1/#main</loc>
		<lastmod>2015-11-12T13:27:37+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/SIMS1.png</image:loc>
			<image:title><![CDATA[SIMS]]></image:title>
			<image:caption><![CDATA[SIMS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/strona-glowna/sims2/#main</loc>
		<lastmod>2015-11-12T13:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/SIMS2.png</image:loc>
			<image:title><![CDATA[SIMS]]></image:title>
			<image:caption><![CDATA[SIMS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-account-security-v9-5/pass-sm/#main</loc>
		<lastmod>2015-11-12T13:34:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/PASS-sm.png</image:loc>
			<image:title><![CDATA[PASS]]></image:title>
			<image:caption><![CDATA[PASS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-account-security-v9-5/pass-sm-2/#main</loc>
		<lastmod>2015-11-12T13:36:00+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/PASS-sm1.png</image:loc>
			<image:title><![CDATA[PASS]]></image:title>
			<image:caption><![CDATA[PASS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/nowa-wersja-privileged-threat-analytics-pta-v2-6-3-1/pta/#main</loc>
		<lastmod>2015-11-12T13:38:06+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/PTA.png</image:loc>
			<image:title><![CDATA[PTA]]></image:title>
			<image:caption><![CDATA[PTA]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/strona-glowna/sims3/#main</loc>
		<lastmod>2015-11-12T13:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/SIMS3.png</image:loc>
			<image:title><![CDATA[SIMS]]></image:title>
			<image:caption><![CDATA[SIMS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/bezpieczenstwo-przywileje-i-chmura/bezpieczenstwo/#main</loc>
		<lastmod>2016-01-15T12:38:35+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:title><![CDATA[CyberArk liderem]]></image:title>
			<image:caption><![CDATA[CyberArk liderem]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/cyberark-liderem-wsrod-dostawcow-pim-wg-raportu-kuppingercole/raport-privilege-management-leadership-compass/#main</loc>
		<lastmod>2016-01-15T12:46:58+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2016/01/Raport-Privilege-Management-LEADERSHIP-COMPASS.png</image:loc>
			<image:title><![CDATA[Raport Privilege Management LEADERSHIP COMPASS]]></image:title>
			<image:caption><![CDATA[Raport Privilege Management LEADERSHIP COMPASS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/viewfinity/viefinity/#main</loc>
		<lastmod>2016-02-27T23:56:26+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2016/02/Viefinity.png</image:loc>
			<image:title><![CDATA[Viefinity]]></image:title>
			<image:caption><![CDATA[Viefinity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/viewfinity/viefinity-wglad-we-wszystkie-zbiory-regul-dotyczacych-uprawnien-aplikacji-i-danych-o-ich-reputacji-w-jednym-miejscu/#main</loc>
		<lastmod>2016-02-28T00:46:46+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2016/02/Viefinity-wgl%C4%85d-we-wszystkie-zbiory-regu%C5%82-dotycz%C4%85cych-uprawnie%C5%84-aplikacji-i-danych-o-ich-reputacji-w-jednym-miejscu.jpg</image:loc>
			<image:title><![CDATA[Viefinity wgląd we wszystkie zbiory reguł dotyczących uprawnień, aplikacji i danych o ich reputacji  w jednym miejscu]]></image:title>
			<image:caption><![CDATA[Wgląd we wszystkie zbiory reguł dotyczących uprawnień, aplikacji i danych o ich reputacji w jednym miejscu]]></image:caption>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->