<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyberark.integritypartners.pl/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyberark.integritypartners.pl/</loc>
		<lastmod>2017-08-11T09:51:09+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo-285x190.png</image:loc>
			<image:caption><![CDATA[CyberArk liderem wśród dostawców PIM wg raportu KuppingerCole]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo-285x190.png</image:loc>
			<image:caption><![CDATA[Osiem rad ekspertów bezpieczeństwa na zmniejszenie nadużycia kont uprzywilejowanych]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo-285x190.png</image:loc>
			<image:caption><![CDATA[Bezpieczeństwo Amazon prawdopodobne naruszone przez atak typu Breach]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo-285x190.png</image:loc>
			<image:caption><![CDATA[Bezpieczeństwo, przywileje i chmura]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/PASS-sm1-285x123.png</image:loc>
			<image:caption><![CDATA[Privileged Account Security v9.5]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/ViewFinity.png</image:loc>
			<image:caption><![CDATA[CyberArk finalizuje przejęcie Viewfinity]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/PTA.png</image:loc>
			<image:caption><![CDATA[Nowa wersja Privileged Threat Analytics (PTA) v2.6.3.1]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/themes/Minamaze_Pro/images/transparent.png</image:loc>
			<image:caption><![CDATA[Demo Image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/themes/Minamaze_Pro/images/transparent.png</image:loc>
			<image:caption><![CDATA[Demo Image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/themes/Minamaze_Pro/images/transparent.png</image:loc>
			<image:caption><![CDATA[Demo Image]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/CyberArk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/CyberArk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/CyberArk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/sitemap/</loc>
		<lastmod>2015-08-14T12:52:47+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/dummy.jpg</image:loc>
			<image:title><![CDATA[dummy]]></image:title>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/aktualnosci-cyberark/</loc>
		<lastmod>2015-10-07T13:31:03+01:00</lastmod>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/sensitive-information-management-solution/</loc>
		<lastmod>2016-08-29T14:12:53+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/CyberArk-Sensitive-Information-Management-Solution.png</image:loc>
			<image:title><![CDATA[CyberArk Sensitive Information Management Solution]]></image:title>
			<image:caption><![CDATA[CyberArk Sensitive Information Management Solution]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/CyberArk-Sensitive-Information-Management-Solution.png</image:loc>
			<image:title><![CDATA[Sensitive Information Management Solution]]></image:title>
			<image:caption><![CDATA[CyberArk Sensitive Information Management Solution]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Sensitive-Information-Management-Solution-Chart.png</image:loc>
			<image:title><![CDATA[Sensitive Information Management Solution schemat]]></image:title>
			<image:caption><![CDATA[Sensitive Information Management Solution schemat]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-account-security-solution/</loc>
		<lastmod>2016-08-29T14:17:42+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Privileged-Account-Security-Solution.png</image:loc>
			<image:title><![CDATA[Privileged Account Security Solution]]></image:title>
			<image:caption><![CDATA[Privileged Account Security Solution]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Privileged-Account-Security-Solution.png</image:loc>
			<image:title><![CDATA[Privileged Account Security Solution]]></image:title>
			<image:caption><![CDATA[Privileged Account Security Solution]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-threat-analytics/</loc>
		<lastmod>2016-08-29T14:18:54+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Threat-Analytics.png</image:loc>
			<image:title><![CDATA[Privileged Threat Analytics]]></image:title>
			<image:caption><![CDATA[Privileged Threat Analytics]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Threat-Analytics.png</image:loc>
			<image:title><![CDATA[Privileged Threat Analytics]]></image:title>
			<image:caption><![CDATA[Privileged Threat Analytics]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Threat-Analytics-diagram.png</image:loc>
			<image:title><![CDATA[Privileged Threat Analytics diagram]]></image:title>
			<image:caption><![CDATA[Privileged Threat Analytics diagram]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/on-demand-privileges-manager/</loc>
		<lastmod>2016-08-29T14:20:45+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/On-Demand-Privileges-Manager.png</image:loc>
			<image:title><![CDATA[On-Demand Privileges Manager]]></image:title>
			<image:caption><![CDATA[On-Demand Privileges Manager]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/On-Demand-Privileges-Manager.png</image:loc>
			<image:title><![CDATA[On-Demand Privileges Manager]]></image:title>
			<image:caption><![CDATA[On-Demand Privileges Manager]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/enterprise-password-vault/</loc>
		<lastmod>2016-08-29T14:22:05+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/EPV.png</image:loc>
			<image:title><![CDATA[CyberArk EPV]]></image:title>
			<image:caption><![CDATA[CyberArk EPV]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/EPV.png</image:loc>
			<image:title><![CDATA[Enterprise Password Vault]]></image:title>
			<image:caption><![CDATA[Enterprise Password Vault]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Enterprise-Password-Vault.png</image:loc>
			<image:title><![CDATA[Enterprise Password Vault]]></image:title>
			<image:caption><![CDATA[Enterprise Password Vault]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/application-identity-manager/</loc>
		<lastmod>2016-08-29T14:23:40+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/AIM.png</image:loc>
			<image:title><![CDATA[CyberArk AIM]]></image:title>
			<image:caption><![CDATA[CyberArk AIM]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/AIM.png</image:loc>
			<image:title><![CDATA[Application Identity Manager]]></image:title>
			<image:caption><![CDATA[Application Identity Manager]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/ssh-key-manager/</loc>
		<lastmod>2016-08-29T14:24:57+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/CyberArk-SSH-Key-Manager.png</image:loc>
			<image:title><![CDATA[CyberArk SSH Key Manager]]></image:title>
			<image:caption><![CDATA[CyberArk SSH Key Manager]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/CyberArk-SSH-Key-Manager.png</image:loc>
			<image:title><![CDATA[SSH Key Manager]]></image:title>
			<image:caption><![CDATA[CyberArk SSH Key Manager]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-session-manager/</loc>
		<lastmod>2016-08-29T14:25:54+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Session-Manager.png</image:loc>
			<image:title><![CDATA[Privileged Session Manager]]></image:title>
			<image:caption><![CDATA[Privileged Session Manager]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Session-Manager.png</image:loc>
			<image:title><![CDATA[Privileged Session Manager]]></image:title>
			<image:caption><![CDATA[Privileged Session Manager]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/viewfinity/</loc>
		<lastmod>2016-08-29T14:27:14+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2016/02/Viefinity.png</image:loc>
			<image:title><![CDATA[Viefinity]]></image:title>
			<image:caption><![CDATA[Viefinity]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2016/02/Viefinity.png</image:loc>
			<image:title><![CDATA[Viefinity]]></image:title>
			<image:caption><![CDATA[Viefinity]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2016/02/Viefinity-wgl%C4%85d-we-wszystkie-zbiory-regu%C5%82-dotycz%C4%85cych-uprawnie%C5%84-aplikacji-i-danych-o-ich-reputacji-w-jednym-miejscu.jpg</image:loc>
			<image:title><![CDATA[Viefinity wgląd we wszystkie zbiory reguł dotyczących uprawnień, aplikacji i danych o ich reputacji w jednym miejscu]]></image:title>
			<image:caption><![CDATA[Viefinity wgląd we wszystkie zbiory reguł dotyczących uprawnień, aplikacji i danych o ich reputacji w jednym miejscu]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/o-cyberark/</loc>
		<lastmod>2016-08-29T14:29:29+01:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/dummy.jpg</image:loc>
			<image:title><![CDATA[dummy]]></image:title>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/CyberArk.png</image:loc>
			<image:title><![CDATA[CyberArk]]></image:title>
			<image:caption><![CDATA[CyberArk]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/kontakt/</loc>
		<lastmod>2016-11-03T12:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/dummy.jpg</image:loc>
			<image:title><![CDATA[dummy]]></image:title>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->