<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cyberark.integritypartners.pl/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cyberark.integritypartners.pl/cyberark-otrzymuje-certyfikacje-common-criteria/</loc>
		<lastmod>2015-09-28T12:01:27+01:00</lastmod>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/cyberark-finalizuje-przejecie-viewfinity/</loc>
		<lastmod>2015-11-12T12:50:33+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/ViewFinity.png</image:loc>
			<image:title><![CDATA[ViewFinity]]></image:title>
			<image:caption><![CDATA[ViewFinity]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/cyberark-wygrywa-nagrode-identity-and-authentication-management-award-zarzadzanie-tozsamoscia-i-uwierzytelnianiem/</loc>
		<lastmod>2016-08-29T15:22:15+01:00</lastmod>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/cyberark-liderem-wsrod-dostawcow-pim-wg-raportu-kuppingercole/</loc>
		<lastmod>2016-11-03T10:52:18+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:title><![CDATA[CyberArk liderem]]></image:title>
			<image:caption><![CDATA[CyberArk liderem]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2016/01/Raport-Privilege-Management-LEADERSHIP-COMPASS.png</image:loc>
			<image:title><![CDATA[CyberArk liderem wśród dostawców PIM]]></image:title>
			<image:caption><![CDATA[Raport Privilege Management LEADERSHIP COMPASS]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/osiem-rad-ekspertow-bezpieczenstwa-na-zmniejszenie-naduzycia-kont-uprzywilejowanych/</loc>
		<lastmod>2016-11-03T10:53:26+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:title><![CDATA[CyberArk liderem]]></image:title>
			<image:caption><![CDATA[CyberArk liderem]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:title><![CDATA[Bezpieczeństwo]]></image:title>
			<image:caption><![CDATA[Bezpieczeństwo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/bezpieczenstwo-amazon-prawdopodobne-naruszone-przez-atak-typu-breach/</loc>
		<lastmod>2016-11-03T10:54:40+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:title><![CDATA[CyberArk liderem]]></image:title>
			<image:caption><![CDATA[CyberArk liderem]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:title><![CDATA[Bezpieczeństwo]]></image:title>
			<image:caption><![CDATA[Bezpieczeństwo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/bezpieczenstwo-przywileje-i-chmura/</loc>
		<lastmod>2016-11-03T10:55:39+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:title><![CDATA[CyberArk liderem]]></image:title>
			<image:caption><![CDATA[CyberArk liderem]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/11/bezpieczenstwo.png</image:loc>
			<image:caption><![CDATA[Bezpieczeństwo]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/privileged-account-security-v9-5/</loc>
		<lastmod>2016-11-03T10:59:19+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/PASS-sm1.png</image:loc>
			<image:title><![CDATA[PASS]]></image:title>
			<image:caption><![CDATA[PASS]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Privileged-Account-Security-Solution.png</image:loc>
			<image:title><![CDATA[Privileged Account Security Solution]]></image:title>
			<image:caption><![CDATA[Privileged Account Security Solution]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/nowa-wersja-privileged-threat-analytics-pta-v2-6-3-1/</loc>
		<lastmod>2016-11-03T11:02:13+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/10/PTA.png</image:loc>
			<image:title><![CDATA[PTA]]></image:title>
			<image:caption><![CDATA[PTA]]></image:caption>
		</image:image>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/09/Privileged-Threat-Analytics.png</image:loc>
			<image:caption><![CDATA[Privileged Threat Analytics]]></image:caption>
		</image:image>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/symantec-ocenia-ze-90-atakow-nie-jest-nigdy-ujawnione/</loc>
		<lastmod>2016-11-03T11:03:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cyberark.integritypartners.pl/idc-marketscape-nazywa-cyberark-liderem-na-rynku-zarzadzania-uprzywilejowanego-dostepu/</loc>
		<lastmod>2016-11-03T12:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://cyberark.integritypartners.pl/wp-content/uploads/2015/08/Enterprise-Password-Vault.png</image:loc>
			<image:title><![CDATA[Privileged Access Management]]></image:title>
			<image:caption><![CDATA[Privileged Access Management]]></image:caption>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->