<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://www.fortanix.com</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/api</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/10-key-management-best-practices-you-should-know</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/10-reasons-businesses-are-investing-in-private-multi-party-analytics-mpa-in-2022</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/100-customers-lead-the-way-expanding-confidential-computing-across-platforms-and-clouds</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/3-overlooked-areas-that-impact-key-management-strategy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-awesome-features-of-fortanix-hsm-solution-that-organizations-love</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-best-practices-for-enforcing-compliance-in-the-data-driven-world-of-finance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-best-practices-for-hardware-security-module-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-facts-from-the-esg-report-on-cloud-data-security-imperative</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-practical-steps-for-cisos-to-secure-genai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-qualities-to-check-while-choosing-the-best-key-management-systems</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-reasons-to-join-the-fortanix-mask-arade</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-tips-to-bolster-your-multicloud-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/5-top-features-of-enterprise-key-management-tool</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/7-benefits-of-fortanix-hsm-backed-key-encryption-key</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/7-best-practices-in-multi-cloud-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/7-enterprise-key-lifecycle-management-mistakes-you-cant-afford</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/7-reasons-why-data-tokenization-is-the-pillar-for-enterprise-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/a-case-study-on-api-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/a-ciso-guide-to-credit-card-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/a-conversation-with-the-fortanix-founders</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/a-deep-dive-into-enterprise-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/a-guide-to-cloud-key-management-best-practices</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/a-new-dawn-in-cyber-defense-understanding-executive-order-14144</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/a-peek-inside-post-quantum-key</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/accelerate-healthcare-compliance-through-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/achieve-full-encryption-visibility-with-fortanix-key-insight</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/achieve-optimal-data-security-privacy-and-compliance-in-aws</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/achieving-zero-trust-architecture-with-cloud-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/act-now-recent-security-changes-to-intel-remote-attestation</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/action-plan-to-mitigate-the-impact-of-data-breaches</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/agentic-ai-meets-enterprise-security-strategy-but-for-you</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/agentic-ai-with-verifiable-trust-security-sovereignty-for-ai-factories-and-enterprises</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ai-accountability-who-is-responsible-when-genai-goes-wrong</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ai-factory-with-the-possibilities-of-empowering-enterprise-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ai-governance-as-the-cornerstone-of-trust-in-the-age-of-generative-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ai-governance-navigating-the-path-to-responsible-compliant-and-sustainable-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ai-security-concerns-a-deep-dive-into-hidden-vulnerabilities</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/aishield-s-ai-model-security-and-fortanix-s-confidential-computing-for-aws-ecosystem</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/algorithmic-ai-vs-generative-ai-what-is-the-difference</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/an-ai-factory-is-not-a-gpu-cluster-and-securing-only-one-layer-is-a-dangerous-illusion</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/an-introduction-to-code-signing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-fortanix-confidential-ai-building-better-ai-models-while-preserving-privacy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-fortanix-data-security-manager-as-a-service</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-fortanix-data-security-manager-integration-with-cohesity</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-fortanix-dsm-support-for-the-aws-external-key-store-xks</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-fortanix-enclave-development-platform</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-fortanix-enclave-development-platform-integration-with-fortanix-enclave-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-the-90m-series-c-in-our-quest-to-solve-cloud-security-and-privacy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/announcing-the-dsm-accelerator-for-high-performance-and-high-transactional-throughput</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/architecture-decisions-that-matter-for-the-ai-factory-tech-stack</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/are-you-a-saas-provider-with-customers-demanding-byok-hyok</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/as-apple-touts-personal-ai-privacy-who-is-protecting-enterprises</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/australia-highlights-from-the-h1-2021-oaic-notifiable-data-breach-report</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/best-protection-for-blockchain-bip32-keys</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/beyond-the-buzz-part-1-a-point-of-view-on-the-data-security-lifecycle</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/blockchain-offload-security-concerns-to-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/bridging-innovation-and-compliance-in-finance-with-confidential-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/bringing-confidential-computing-to-ai-factories-how-fortanix-hpe-and-nvidia-enable-trusted-and-secure-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/can-a-cyberattack-cause-the-next-financial-meltdown</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/celebrate-data-privacy-day-with-a-ciso-and-cdo-meeting-of-the-minds</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/checklist-on-how-to-choose-the-right-hsm-as-a-service</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/choosing-right-path-between-userspace-vs-kernel-space-file-system-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ciso-facing-a-balancing-act-of-genai-benefits-and-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ciso-roundtable-implementing-tokenization-for-resilient-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/cloud-data-protection-strategy-for-real-time-multicloud-workflows</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/cloud-hsm-vs-kms-which-is-right-for-your-enterprise-data-security-strategy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/cloud-scale-hsm-and-key-management-for-big-ip-and-nginx-tls</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/cloud-security-journey-from-ridiculous-to-mainstream-to-ridiculous</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/code-signing-solution-for-docker-images</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/companies-are-exposing-their-model-weights-and-leaking-enterprise-value-without-even-knowing-it</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/confidential-ai-for-secure-healthcare-innovation</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/confidential-computing-a-tale-about-trust</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/confidential-computing-ai-to-overcome-data-privacy-challenges</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/confidential-computing-its-not-a-matter-of-if-its-a-matter-of-when</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/confidential-computing-the-early-bird-catches-the-worm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/confidential-computing-with-real-time-data-streams</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/confidential-speech-recognition</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/crypto-visibility-for-google-cloud-know-where-your-keys-are</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/cryptographic-agility-pqc-why-being-adaptable-matters</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/cybersecurity-awareness-month-the-key-factor-of-data-breaches</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-breaches-love-holiday-seasons</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-breaches-top-sectors-of-interest-in-2021</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-centric-zero-trust-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-privacy-integrity-challenges-for-securing-ai-in-healthcare</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-protection-encryption-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-amid-the-pandemic-getting-it-done-vs-doing-it-right</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-and-a-fintech-state-of-mind</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-and-compliance-for-banking-and-financial-services-institutions-part-1</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-encryption-approaches-deliver-varying-levels-of-multi-cloud-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-for-australian-companies-in-melbourne-summit</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-in-the-age-of-pandemics-surviving-and-thriving</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-is-central-to-the-eu-ai-act</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-posture-management-dspm-for-data-security-is-that-enough</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-practices-to-build-cyber-resilience-and-manage-ai-risk</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-simplified-with-cloud-hsm-and-kms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-security-with-fortanix-at-the-fs-isac-americas-spring-summit</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-sovereignty-and-privacy-compliance-post-schrems-ii</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/data-tokenization-best-practices-guide</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/decrypting-google-client-side-encryption-with-fortanix</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/defending-your-google-workspace-itar-compliance-challenges-with-insider-threat</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/demystifying-the-fortanix-android-data-security-manager-accelerator</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/demystifying-the-security-of-your-digital-transformation</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/deploying-siamese-networks-confidentially</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/difference-between-post-quantum-crypto-and-quantum-crypto</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/differences-between-byok-and-hyok</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/drive-pci-dss-compliance-across-analytic-workflows</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/dspm-is-not-the-end-of-data-security-line-next-step-is-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/dspm-vs-cspm-the-key-differences</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/dual-control-in-code-signing-using-crypto-interfaces</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/easy-user-onboarding-with-guided-experience</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/enabling-virtual-private-cloud-security-with-azure</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/encrypt-amazon-sagemaker-notebook-data-with-byok</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/encryption-is-easy-key-management-is-hard</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/end-of-life-for-vormetric-choose-the-better-alternative</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/enhancing-data-privacy-and-security-in-the-digital-age</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/enhancing-next-best-action-in-healthcare-with-dsm-solution-part-1</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ensuring-software-integrity-with-fortanix-code-signing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ensuring-unwavering-security-resiliency-in-fortanix-dsm-saas</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/enterprise-cybersecurity-solutions-where-are-the-gaps-in-the-age-of-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/enterprise-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/enterprise-key-management-best-practices</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/extending-the-circle-of-trust-with-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/findings-from-rsac2018-cloud-security-survey</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/five-things-you-need-to-know-about-side-channels</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fiverity-and-fortanix-helping-financial-institutions-fight-back-against-digital-fraud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/formal-verification-of-edp-enclave-entry-and-exit-code</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-and-bigid-partners-to-unveil-data-security-for-ai-and-post-quantum-world</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-and-equinix-collaborate-to-launch-equinix-smartkey-beta-program</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-and-ibm-cloud-extend-cloud-security-collaboration-with-new-data-shield</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-and-ibm-partner-to-launch-dataguard</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-armet-ai-for-secure-genai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-armet-ai-power-sovereign-agentic-ai-with-nvidia-nemotron</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-armet-ai-taming-the-data-security-privacy-governance-compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-at-rsa-conference</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-at-rsa-conference-2022-security-wherever-your-data-is</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-confidential-computing-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-confidential-containers-on-microsoft-azure-kubernetes-service-aks</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-cpo-unpacks-the-most-critical-data-security-questions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-dsm-saas-getting-up-to-speed-with-cps-234</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-helps-banks-secure-data-lakes-enroute-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-introduces-armet-ai-a-secure-turnkey-genai-solution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-key-insight-to-protect-data-with-enterprise-key-posture-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-powering-compliance-with-executive-order-14144</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-reaching-new-heights-in-data-first-cybersecurity</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-secures-vmware-infrastructure-on-google-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-unlocks-the-power-of-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortanix-will-be-showcasing-rte-at-ibm-think</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortify-your-ai-workloads-by-leveraging-secure-confidential-computing-and-adding-an-ai-model-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortifying-database-protection-with-fortanix-data-security-manager-part-i</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortifying-database-protection-with-fortanix-data-security-manager-part-ii</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/fortifying-database-protection-with-fortanix-data-security-manager-part-iii</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/from-sensitive-data-to-proprietary-ai-ip-securing-your-crown-jewels-requires-confidential-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/future-of-data-security-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/genai-and-the-rising-threat-of-data-breaches</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/generative-ai-a-friend-or-a-foe</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/getting-started-with-database-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/giving-companies-the-keys-to-controlling-their-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/grappling-with-the-problems-of-digital-assets-and-web-3-0</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/guide-to-mastering-data-security-in-post-quantum-world</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/harnessing-ai-for-justice-security-and-opportunity-for-all</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-a-vintage-american-apparel-brand-achieved-product-innovation-with-data-security-strategy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-cloud-hsm-simplifies-key-management-for-global-enterprises</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-confidential-computing-protects-government-ai-missions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-crypto-agility-defines-the-next-gen-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-customers-took-control-of-their-cryptographic-security-posture</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-data-centric-security-solutions-for-enterprise-help-achieve-compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-data-security-can-drive-business-success</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-data-tokenization-protects-sensitive-data-across-the-enterprise</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-data-tokenization-reduces-data-exposure-risks-in-hybrid-cloud-environments</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-explainable-ai-and-confidential-computing-break-open-the-ai-black-box</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-federal-agencies-can-stop-data-exfiltration-and-mitigate-risk</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-fortanix-as-a-cloud-data-security-company-reduces-the-risk-of-business-data-leak</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-fortanix-displaced-legacy-hsms-to-simplify-and-modernize-digital-payment-signing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-fortanix-empowers-data-backups-and-recovery-companies-to-prevent-data-leaks</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-fortanix-key-insight-fills-the-gaps-of-cspm-tools</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-fortanix-secures-proof-of-stake-validator-nodes</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-fortanix-strengthens-your-digital-operational-resilience</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-hsm-can-help-in-banking-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-is-your-cyber-hygiene</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-saas-vendors-can-build-trust-with-customers-by-enabling-zero-trust-in-their-software</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-solarwinds-busted-up-our-assumptions-about-code-signing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-achieve-enterprise-data-security-with-kms-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-adapt-new-security-strategies-after-vormetric-ends</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-build-a-cloud-data-security-strategy-for-enterprises</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-byok-to-the-cloud-using-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-choose-the-best-cloud-data-security-solution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-choose-the-best-data-security-company</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-choose-the-right-encryption-for-your-database</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-conduct-a-risk-based-assessment-aligned-with-pci-dss-4-0-compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-encrypt-data-at-rest-on-cloud-block-storage</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-find-the-exact-data-security-services-your-business-is-seeking</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-find-the-most-efficient-enterprise-key-management-system-for-your-business</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-future-proof-your-encryption-with-next-gen-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-implement-a-byoe-strategy-for-securing-business-critical-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-keep-your-data-confidential-and-mine-it-too-private-multi-party-analytics-with-fortanix-rte</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-keep-your-secrets-secret</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-know-which-is-your-best-cloud-security-solution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-make-sure-your-business-does-not-struggle-in-the-next-data-security-breach</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-prevent-data-breaches-in-the-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-protect-oracle-and-microsoft-sql-databases-with-sdkms-and-tde</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-protect-sensitive-data-in-virtual-environments</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-protect-your-applications-on-public-and-private-clouds-using-fortanix-rte</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-secure-data-in-hybrid-and-multi-cloud-architectures</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-secure-your-data-with-keys-for-enterprise-business</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-train-a-centralised-ai-ml-model-on-a-decentralized-data-securely</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-to-understand-which-unified-cloud-security-platform-you-need</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-top-cisos-leverage-tokenization-for-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/how-will-intels-ice-lake-redefine-the-scope-of-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/hsm-as-a-service-hsmaas-10-questions-you-should-ask</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/hsm-security-with-cloud-like-economics</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/huge-data-loss-at-vw-due-to-lack-of-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/hybrid-cloud-key-management-becomes-the-new-enterprise-standard</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/hyperledger-fabric-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/ibm-and-fortanix-taking-on-the-public-cloud-data-security-challenge</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/improving-cryptographic-posture-through-entropy-diversification</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/in-the-advent-of-rsac2019</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/insights-from-2020-acceleration-in-cloud-adoption-and-remote-work-drive-the-need-for-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/insights-on-data-security-for-emea-organizations</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/insurance-company-strengthening-crypto-security-posture</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/intel-sgx-technology-and-the-impact-of-processor-side-channel-attacks</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/international-data-privacy-day-2023-securing-the-key-to-data-privacy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/international-womens-day-lets-inspire-empower-and-change</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/iot-pki-securing-internet-and-things</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/is-cspm-security-enough-to-secure-your-business-data-in-the-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/is-your-business-prepared-for-the-latest-pci-dss-4-0-compliance-requirements</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/is-your-cloud-key-management-solution-ready-for-the-quantum-revolution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/is-your-cloud-powered-by-cloud-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/is-your-data-future-proof-why-quantum-resistant-cryptography-matters-now</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/its-a-secret-shhh</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/keeping-data-secure-and-confidential-in-public-clouds</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/keeping-the-keys-to-your-kingdom-google-and-fortanix-partner-to-deliver-byokms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/keeping-the-keys-to-your-kingdom-google-and-fortanix-partner-to-deliver-byokms-2</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/keeping-the-keys-to-your-kingdom-google-and-fortanix-partner-to-deliver-byokms-3</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/keeping-your-apps-secrets-secret</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/key-differences-between-on-premises-hsm-and-hsm-saas</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/key-learnings-on-operationalizing-encryption-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/key-management-automation-with-jira</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/key-management-best-practices-for-keyfactor-ejbca-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/key-management-challenges-and-solutions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/key-management-maturity-model-for-data-security-success</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/key-management-within-multi-cloud-environments</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/kms-and-hsm-a-match-made-in-heaven</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/kubernetes-secrets-injection-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/launchnodes-fortanix-joint-service-for-cosmos-nodes</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/legacy-hsm-vs-modern-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/legacy-vaulted-tokenization-vs-vaultless-format-preserving-encryption-fpe</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/less-is-more-asian-bank-ditches-disparate-solutions-for-an-integrated-data-security-suite</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/lessons-from-forresters-best-practices-cloud-data-encryption-report</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/let-data-make-the-most-of-your-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/leveraging-confidential-computing-securing-collaboration-for-competitive-advantage</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/life-at-fortanix</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/limitations-of-data-security-posture-management-dspm-tools-and-how-you-can-overcome-them</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/making-a-secure-statement-to-your-customers</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/managing-key-lifecycle-for-enterprise-a-ciso-story</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/managing-risk-and-ensuring-compliance-with-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/master-data-tokenization-to-treat-customers-not-trick-them-into-horrors</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/mastering-compliance-for-a-secure-future</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/meet-fortanix-at-the-black-hat-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/meltdown-and-spectre-vulnerabilities-provide-important-lessons</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/microsoft-aks-azure-kubernetes-service-secrets-injection-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/modernizing-your-hsms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/monitoring-intel-sgx-enclaves</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/most-enterprises-are-managing-keys-wrong-paying-millions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/navigating-the-future-of-ai-understanding-the-eu-ai-act</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/never-bring-a-knife-to-a-gunfight</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/new-approach-to-secure-cloud-environments-with-quantum-key-distribution-qkd</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/on-malleability-of-security-software</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/onwards-and-upwards-setting-the-stage-for-purposeful-growth</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/open-vs-closed-weight-models</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/optimizing-your-key-management-lifecycle</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/oracle-data-breach-is-a-wake-up-call-to-rethink-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/organizations-can-finally-stop-choosing-between-ai-and-data-privacy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/paving-the-way-for-a-new-data-security-category-enterprise-key-posture-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/pgp-with-secrets-in-the-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/pii-data-security-in-a-hybrid-and-multicloud-world</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/pioneers-hsms-and-the-future</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/planning-and-implementing-an-enterprise-kms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/preparing-for-the-post-quantum-era-guide</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/prevent-data-breaches-with-enterprise-key-management-system</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/prevent-data-exposure-and-non-compliance-in-databricks-environment</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/prevent-data-exposure-and-non-compliance-in-your-snowflake-environment-with-fortanix-data-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/preventing-money-laundering-in-a-confidential-computing-way</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/primary-key-holder</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/privacy-keeping-sensitive-data-safe-when-migrating-to-the-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/prompt-injection-the-new-cyber-attack-vector</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/protect-your-code-and-business-logic-with-runtime-encryption-plugins</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/protecting-data-from-breaches-requires-an-encryption-key-management-strategy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/protecting-different-visions-of-a-future-internet-country</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/protecting-kafka-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/protecting-secrets-in-kubernetes-using-fortanix-csi-provider</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/protecting-your-data-in-devops-process-with-fortanix-apis</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/protecting-your-sensitive-data-in-the-public-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/provable-defense-against-cyber-breaches</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/public-llms-are-the-hotel-california-for-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/qualities-to-look-for-in-a-data-security-company</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/quantum-data-governance-securing-ai-training-data-in-a-post-quantum-world</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/quantum-key-encryption-in-a-post-quantum-world</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/quantum-physics-and-the-hunt-for-entropy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/quantum-security-for-post-quantum-cryptography</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/quantum-threat-is-real-are-you-ready-to-respond</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/rag-a-cost-effective-approach-to-enhancing-llm-output</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/retaining-encryption-keys</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/revolutionizing-data-security-with-seamless-hsm-integration</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/risk-of-delaying-quantum-safe-algorithms-in-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/role-of-file-encryption-in-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/rsa-conference-2022-q-a-fortanix-will-be-showcasing-confidential-computing-modern-data-security-for-multi-cloud-and-more</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/running-tensorflow-models-inside-secure-enclaves-with-fortanix-runtime-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/saas-is-the-new-black</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/secure-ansible-secrets-management-using-external-kms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/secure-boot-in-fortanix-fx3400-appliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/secure-by-design-rust-and-runtime-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/secure-genai-with-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/secure-legacy-applications-using-format-preserving-encryption-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/secure-second-factor-authentication-for-custodial-wallets</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/secure-your-containers-with-confidential-computing-in-the-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/securing-big-data-in-cloud-object-storage</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/securing-enterprise-applications-and-ai-pipelines-with-attestation-gated-secure-key-release</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/securing-healthcare-ai-with-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/securing-kubernetes-secrets-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/securing-sensitive-data-in-dynamic-environments-with-filesystem-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/securing-tendermint-apps-with-fortanix-dsm-tmkms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/securing-the-administrative-layer-what-stryker-cyberattack-has-taught-us</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/shadow-ai-is-creating-uncontrolled-risk</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/should-i-be-concerned-about-quantum-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/shrink-to-win-big-small-models-small-data-sets-big-impact</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/simple-steps-to-meet-pci-dss-4-0-compliance-protect-payment-and-cardholder-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/simplify-your-path-to-pci-dss-4-0-compliance-with-a-strategy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/simplifying-cybersecurity-its-all-about-the-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/simplifying-pqc-migration-with-fortanix-key-insight-in-the-post-quantum-era</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/six-insights-from-the2021-sans-cloud-security-survey</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/solving-the-tpm-key-provisioning-problem-with-fortanix-data-security-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/start-your-post-quantum-cryptography-journey-now</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/strengthening-your-data-exposure-posture-a-unified-approach-for-business-resilience</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/support-for-confidential-azure-container-instances</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/tackling-the-demand-for-a-crypto-cadaster</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/take-your-google-workspace-data-security-privacy-and-compliance-to-the-next-level</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/terraform-digitalocean-fortanix-dsm-secure-access</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-a-z-guide-to-choosing-the-best-and-most-secure-crypto-wallets-in-the-web3-era</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-ai-product-that-does-not-exist-but-everyone-needs</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-business-case-for-enterprise-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-convergence-of-ai-factories-and-confidential-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-data-protection-act-of-india-a-step-in-the-right-direction</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-difference-between-byoe-and-byok-in-the-data-security-space</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-executive-order-on-safe-secure-and-trustworthy-ai-join-the-summit</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-fortanix-opportunity-to-reshape-data-protection-in-cloud-first-world</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-future-of-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-future-of-quantum-resistant-cryptography-a-data-security-perspective</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-hidden-compliance-nightmare-every-ciso-faces-with-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-hsm-is-dead-long-live-the-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-hustle-to-stay-away-from-the-whistle</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-intricacies-of-compliant-saas-based-data-analytics</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-quantum-threat-moving-from-denial-to-acceptance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-rise-of-confidential-blockchains</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-role-of-cloud-hsm-in-strengthening-enterprise-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-role-of-confidential-computing-in-protecting-cloud-applications-and-sensitive-data-from-breaches</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-role-of-format-preserving-encryption-in-securing-enterprise-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-role-of-hsm-in-the-cybersecurity-industry</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-state-of-post-quantum-cryptography-and-how-to-make-it-a-competitive-differentiator</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-threats-lurking-in-data-security-silos</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/the-three-things-you-must-protect-in-ai-systems-model-weights-prompts-and-context</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/thinking-out-loud-nfts-crypto-and-beyond</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/tokenization-as-a-key-tool-for-pci-dss-compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/tokenization-as-an-api-a-walkthrough-with-fortanix-dsm-saas</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-10-cloud-data-security-challenges-solutions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-10-reasons-to-choose-fortanix-secrets-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-10-security-risks-for-large-language-models-owasp</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-5-benefits-of-bring-your-own-encryption-byoe-for-enterprise-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-5-cloud-data-security-features</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-5-cloud-data-security-risks-for-enterprises-and-how-to-avoid-them</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-5-enterprise-data-security-best-practices</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-5-reasons-to-engage-with-fortanix-at-rsa-conference-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-cloud-security-tools-you-need-to-protect-your-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/top-data-security-mistakes-to-avoid-this-data-privacy-week</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/transforming-pii-data-sharing-in-financial-institutions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/transition-to-the-best-pqc-algorithm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/trust-and-integrity-in-the-cloud-manage-your-secure-containers-with-fortanix-rte</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/trust-in-rust</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/understand-common-genai-cyber-attacks-more-you-know-better-you-protect</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/untold-challenge-of-post-quantum-cryptography-migration</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/upcoming-intel-sgx-features-explained</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/using-confidential-computing-to-protect-function-as-a-service-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/using-tokenization-to-protect-sensitive-application-data-on-devops-teams</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/verifying-correctness-of-intel-sgx-software-mitigations-in-fortanix-edp</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-are-the-differences-between-ai-factories-and-traditional-data-centers</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-are-the-factors-to-consider-while-choosing-the-best-hardware-security-module</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-are-the-key-characteristics-of-a-next-generation-hardware-security-module</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-are-the-steps-to-understand-how-byok-works-in-data-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-confidential-data-search-means-for-your-data-analytics</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-does-australia-s-cloud-act-partnership-mean-for-you</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-if-ai-got-hacked-by-an-insider</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-if-ai-solved-your-cpo-cro-data-nightmare-without-risking-everything</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/what-modern-data-security-management-looks-like</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/where-ai-security-actually-breaks-training-inference-and-runtime-exposure</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/which-post-quantum-cryptography-pqc-algorithm-should-i-use</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-are-enclaves-taking-over-security-world</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-cant-hsm-and-key-management-be-provided-as-a-managed-service</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-cloud-data-security-must-adapt-to-post-quantum-threat</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-cloud-native-security-needs-a-rethink-in-the-age-of-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-confidential-ai-is-now-a-business-necessity</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-confidential-computing-is-the-missing-link-for-llms-in-e-commerce-risk-detection</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-confidential-computing-is-the-next-frontier-in-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-cspm-vendors-arent-securing-your-encryption-keys</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-data-security-in-the-cloud-needs-to-evolve-for-post-quantum-threats</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-data-security-is-more-critical-than-ever</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-dspm-and-kms-hsm-are-better-together-in-todays-data-security-era</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-enterprise-are-turning-to-tokenization-for-data-centric-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-enterprises-struggle-to-meet-data-security-policies</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-every-organization-needs-an-hsm-to-protect-sensitive-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-financial-services-are-racing-to-upgrade-key-management-systems</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-google-external-key-manager-is-a-game-changer-for-small-business</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-hybrid-cloud-needs-unified-key-management-strategy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-physical-locality-is-a-risk-to-resilience-and-how-confidential-computing-can-help</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-secrets-management-is-critical-to-devops-pipeline-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-the-world-is-moving-to-hardware-based-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-traditional-security-is-failing-sensitive-ai-workloads-and-why-confidential-computing-is-now-required</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-we-chose-intel-sgx-to-power-runtime-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-your-business-needs-post-quantum-cryptography-experts-insights</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/why-your-key-management-system-is-your-ultimate-security-hero</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/will-quantum-cryptography-be-able-to-eliminate-data-breaches-in-the-future</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/you-forgot-to-lock-your-chest</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/zero-trust-architecture-with-fortanix-enclave-development-platform-edp</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/zero-trust-how-fortanix-gives-you-ultimate-control-in-securing-sensitive-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/blog/zero-trust-the-importance-of-cryptography-key-management-and-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/community</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/about</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/awards</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/careers</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/events</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/mediakit</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/news</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/news/news-2017-2022</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/news/news-2023-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/11/2017/fortanix-extends-lead-with-plugin-and-sso</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2017/06/fortanix-announces-8-million-investment-from-foundation-capital-and-neotribe-for-runtime-encryption-technology</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2017/09/fortanix-launches-runtime-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2017/09/fortanix-secures-info-from-vulnerabilities</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/01/fortanix-equips-organizations-to-help-meet-gdpr-requirements</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/01/fortanix-launches-channel-partner-program</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/02/fortanix-selected-as-sc-media-2018-award-finalist</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/03/fortanix-collects-three-awards-in-info-security-product-guide-2018-awards</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/03/fortanix-selected-as-finalist-for-2018rsac-innovation-sandbox</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/03/fortanix-selected-to-power-equinix-smartkey</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/04/fortanix-named-infosec-awards2018-finalist</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/04/fortanix-named-runner-up-for-most-innovative-startup-at-2018rsac</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/04/fortanix-presenting-on-protecting-containerized-apps-at-rsac2018</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/05/fortanix-expands-encryption-ecosystem-with-nextgen-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/05/fortanix-named-2018-cool-vendor-by-gartner</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/06/fortanix-extends-capabilities-of-rte-to-python-and-r-applications</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/07/fortanix-recognized-on-2018-emerging-vendors-list</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/08/fortanix-flexible-key-management-service-addresses-critical-enterprise-blockchain-security-requirements</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/08/fortanix-sdkms-achieves-vmware-ready-status</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/09/fortanix-wins-gold-stevie-award-as-startup-of-the-year</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/10/fortanix-and-alibaba-cloud-partner</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2018/12/elastx-deploys-fortanix-sdkms-rte-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/01/fortanix-raises-series-b-led-by-intel-capital</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/02/fortanix-runtime-encryption-beta-and-ibm-cloud-datashield</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/03/fortanix-launches-open-source-intel-sgx-rust-sdk</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/04/fortanix-sdkms-earns-fips-level-1-certification</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/08/fortanix-marks-third-year-of-delivering-intel-sgx-based-confidential-computing-and-cloud-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/08/fortanix-sdkms-protects-data-in-vmware-vsan-and-vsphere-environments-with-unique-secure-enterprise-wide-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/09/fortanix-listed-as-a-sample-vendor-for-confidential-computing-in-multiple-recent-gartner-hype-cycle-reports</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/10/fortanix-awarded-fips140-2-level-3-certification</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/10/fortanix-joins-confidential-computing-consortium</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2019/11/google-partners-with-fortanix-to-deliver-external-key-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/01/fortanix-reports-record-year-with-sales</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/02/fortanix-announces-availability-of-self-defending-key-management-service-on-vmware-cloud-marketplace</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/03/enterprise-strategy-group-report-highlights-encryption-as-best-method-for-compliance-with-privacy-regulations-such-as-ccpa-and-gdpr</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/04/fortanix-data-security-platform-now-available-on-microsoft-azure-to-enhance-private-data-protection-in-the-public-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/04/fortanix-delivers-first-hybrid-cloud-data-security-solution-that-integrates-cloud-native-applications-with-legacy-hsms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/05/fortanix-confidential-computing-manager-enables-apps-to-run-in-secure-enclaves-on-microsoft-azure-confidential-computing-infrastructure</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/06/fortanix-expands-operations-in-asia-pacific-region-to-continue-meeting-growing-global-demand-for-data-security-solutions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/09/fortanix-partners-with-f5-to-deliver-cloud-scale-hsm-and-advanced-encryption-key-management-for-big-ip-and-nginx-customers</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/09/fortanix-partners-with-snowflake-to-provide-external-tokenization-as-a-service-capabilities</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/09/fortanix-partners-with-vmware-to-enable-cloud-service-providers-to-deliver-data-security-as-a-service</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/09/multi-cloud-data-security-trends-noted-in-gartner-hype-cycle-for-cloud-security-2020</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/10/fortanix-and-google-partner-to-deliver-google-workspace-client-side-encryption-cse</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/10/fortanix-simplifies-compliance-with-reserve-bank-of-india-guidelines-for-tokenisation-of-user-card-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/10/organizations-using-privacy-preserving-analytics-and-confidential-computing-to-gain-business-insights-improve-patient-care-and-protect-privacy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/10/ucsf-fortanix-intel-and-microsoft-azure-utilize-privacy-preserving-analytics-to-accelerate-ai-in-healthcare</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2020/12/fortanix-launches-cloud-data-control-to-secure-private-data-as-businesses-migrate-to-public-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2021/02/fortanix-posts-another-year-of-growth-with-sales-275-prior-year-new-partnerships-and-global-expansion</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2021/04/fortanix-unlocks-the-power-of-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2021/04/new-fortanix-partners-first-program-offers-resellers-new-ways-to-profit-from-data-security-as-customers-move-to-the-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2021/05/fortanix-confidential-computing-and-data-security-solutions-now-microsoft-ip-co-sell-ready-available-in-the-microsoft-azure-marketplace</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2021/07/fortanix-delivers-comprehensive-data-security-as-a-service</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2021/07/fortanix-integrates-with-servicenow-to-protect-data-sovereignty-worldwide</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2021/11/fortanix-introduces-confidential-ai-to-advance-the-development-of-richer-ai-models-and-applications</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/01/fortanix-adds-support-for-aws-nitro-enclaves-strengthens-position-as-leader-in-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/01/fortanix-announces-industry-first-100th-production-customer-for-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/01/fortanix-kicks-off-2022-with-three-industry-award-wins</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/02/fortanix-receives-three-award-recognitions-in-2022-cybersecurity-excellence-awards</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/02/fortanix-reports-stellar-year-with-record-sales-and-customer-wins</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/03/fortanix-supports-government-agencies-to-bolster-federal-data-security-with-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/04/fortanix-expands-leadership-team-to-further-accelerate-its-rapid-growth</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/04/intel-fiverity-and-fortanix-bring-confidential-computing-to-the-fight-against-digital-fraud-in-financial-services</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/05/keyfactor-partners-with-fortanix-to-simplify-and-secure-machine-identity-management-in-hybrid-multi-cloud-environments</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/06/fortanix-launches-the-industry-s-first-web-3-0-era-solutions-based-on-confidential-computing-to-secure-sensitive-digital-assets-and-blockchain-infrastructure</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/06/fortanix-named-winner-of-the-global-infosec-awards-during-rsa-conference-2022</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/08/fortanix-external-key-manager-for-google-cloud-platform-enables-university-of-groningen-to-overcome-gdpr-and-schrems-ii-compliance-challenges-for-private-healthcare-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/08/fortanix-ranks-no-1245-on-the-2022-inc-5000-annual-list</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/09/fortanix-raises-90m-in-series-c-funding-led-by-goldman-sachs-asset-management-to-accelerate-leadership-in-the-data-security-market</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/10/fortanix-named-winner-of-the-black-unicorn-awards</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/11/fortanix-expands-relationship-with-aws-fortanix-data-security-manager-works-with-the-aws-kms-external-key-store</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/11/fortanix-launches-dsm-explorer-a-comprehensive-free-tier-version-of-its-industry-leading-data-security-manager-dsm-saas-for-select-use-cases</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2022/12/fortanix-data-security-manager-dsm-available-to-uk-public-sector-on-g-cloud-13</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/01/fortanix-receives-iso-27001-certification-to-deliver-the-highest-level-of-information-security-and-risk-management-diligence</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/01/fortanix-wins-2023-big-innovation-awards-and-cybersecured-awards</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/03/fortanix-wins-two-2023-cybersecurity-excellence-awards</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/04/cloud-computing-magazine-names-fortanix-a-2023-product-of-the-year-award-winner</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/04/fortanix-named-winner-of-the-coveted-global-infosec-awards-during-rsa-conference-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/04/fortanix-names-ron-longo-chief-revenue-officer</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/04/imperva-and-fortanix-partner-to-protect-confidential-customer-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/06/industry-first-confidential-data-search-for-regulated-encrypted-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/07/fortanix-and-site-partner-to-deliver-multicloud-saas-data-security-offering-to-saudi-arabian-market</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/07/industry-first-saas-based-data-masking-and-tokenization-solution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/10/fortanix-introduces-new-data-security-manager-capabilities</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/11/announcing-fortanix-key-insight-an-industry-first-solution-to-discover-and-remediate-data-security-risks</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2023/12/lack-of-encryption-the-primary-reason-for-sensitive-data-loss</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/01/data-security-manager-saas-now-available-on-aws-marketplace</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/01/fortanix-expands-leadership-team-to-drive-growth-in-data-exposure-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/02/fortanix-joins-the-nist-ai-safety-institute-consortium-to-advance-development-of-safe-and-trustworthy-artificial-intelligence</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/02/fortanix-surpasses-multiple-milestones-reports-on-strong-growth-for-fiscal-year-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/03/appviewx-and-fortanix-partner-to-deliver-enterprises-streamlined-and-secure-machine-identity-management-and-code-signing-solutions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/03/industry-leading-data-security-solutions-to-help-japanese-enterprises-prevent-data-breaches-and-protect-sensitive-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/04/key-insight-to-help-organizations-future-proof-their-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/05/fortanix-accredited-by-singapore-imda-commits-to-help-organizations-strengthen-data-security-posture</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/07/industry-first-scanning-authentication-capabilities-for-on-premises-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/08/adding-file-system-encryption-to-data-security-manager-to-bolster-full-stack-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/08/fortanix-makes-inc-5000-list-of-fastest-growing-private-companies-for-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/08/transform-the-pharmaceutical-development-process-through-confidential-computing-and-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/10/fortanix-and-sectigo-partnership-helps-enterprises-uplevel-software-supply-chain-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/10/fortanix-introduces-expanded-key-insight-data-security-solutions-and-file-system-encryption-solutions-for-the-japan-market</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/11/fortanix-and-carahsoft-partner-to-bring-fortanix-cybersecurity-and-post-quantum-cryptography-solutions-to-the-public-sector</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/11/fortanix-and-versasec-partner-to-enhance-protection-of-master-keys-used-in-crypto-operations</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/11/fortanix-integration-with-aws-nitro-improves-application-performance-without-adding-data-exposure-risk</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2024/11/fortanix-ranked-167-fastest-growing-company-on-the-deloitte-technology-fast-500</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/02/fortanix-enhances-data-first-security-platform-to-secure-against-escalating-ai-and-quantum-computing-threats</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/02/fortanix-releases-2025-genai-data-security-report</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/04/fortanix-armet-ai-enables-enterprises-to-create-secure-and-compliant-custom-gen-ai-applications-to-mitigate-data-exposure-risk</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/04/fortanix-at-rsa-2025-to-deliver-data-and-model-security-across-ai-lifecycle</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/06/fortanix-announces-pqc-central-to-accelerate-post-quantum-readiness</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/08/fortanix-ranks-51-inc-5000-americas-fastest-growing-security-companies</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/09/fortanix-and-bigid-integration-automates-discovery-classification-and-protection-of-sensitive-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/09/fortanix-bolsters-leadership-team-to-accelerate-post-quantum-cryptography-for-global-enterprises</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/10/fortanix-brings-secure-and-trusted-agentic-ai-to-cutting-edge-nvidia-confidential-computing-gpus</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/10/ntt-data-and-fortanix-announce-global-partnership-to-strengthen-security-in-the-ai-and-post-quantum-era</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/11/fortanix-recognized-in-six-2025-gartner-hype-cycles</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/12/fortanix-joins-hpe-unleash-ai-partner-program-to-accelerate-ai-outcomes</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2025/12/fortanix-teams-with-hpe-and-nvidia-to-embed-confidential-computing-in-ai-factories</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2026/02/fortanix-and-ntt-data-partner-to-solve-challenges-around-data-sovereignty-and-security-for-ai-factories</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2026/03/fortanix-confidential-ai-protects-proprietary-model-ip-and-data-for-secure-ai-inference-in-enterprise-ai-factories</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/pr/2026/03/fortanix-eliminates-single-source-entropy-compliance-risk-with-multi-sourced-quantum-randomness-for-enterprise-key-generation</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/company/webinars</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/contact-us</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/a-global-financial-institution-unifies-data-security-management-with-fortanix-data-security-manager-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/beekeeperai-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/blackbaud-strengthens-data-security-and-compliance-with-fortanix-key-insight-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/clarien-bank-enhances-data-security-and-compliance-with-fortanix-tokenization-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/fortanix-confidential-computing-manager-enables-secure-data-exchange-platform-for-a-healthcare-customer-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/global-aerospace-leader-achieves-aviation-data-security-contols-and-standards-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/global-fintech-leader-achieves-seamless-and-secure-cloud-migration-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/global-it-and-business-process-services-leader-solves-pii-data-privacy-challenges-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/global-it-leader-achieves-security-and-compliance-with-fortanix-cloud-first-devops-friendly-solution-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/global-laboratory-services-leader-secures-data-worldwide-with-fortanix-dsm-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/goldman-sachs-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/how-data-security-manager-helped-american-apparel-brand-expands-into-europe-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/invia-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/leading-iot-solution-provider-deliver-secure-iot-monitoring-capabilites-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/medical-imaging-company-meets-gdpr-compliance-with-enterprise-key-management-solution-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/multicloud-data-security-of-highly-distributed-fast-food-chain-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/oc-tanner-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/tgen-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/the-hidden-cryptographic-blind-spots-in-enterprises-with-centralized-key-management-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/customers/university-of-groningen-case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/ai-factory</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/ai-governance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/ai-model-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/data-poisoning</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/generative-ai-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/proprietary-ai-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/retrieval-augmented-generation-rag</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/ai-security/secure-key-release</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/cloud-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/cloud-key-management/aws-xks-external-key-store</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/cloud-key-management/google-ekm-external-key-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/code-signing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/code-signing/certificate</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/compliance/hipaa</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/compliance/pci-dss</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/compliance/phi</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/confidential-computing/confidential-computing-technology</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/cyber-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/cyber-security/cloud-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/cyber-security/data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/encryption/data-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/hardware-security-module</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/hardware-security-module/cloud-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/hardware-security-module/hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/key-management-system</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/key-management-system/bring-your-own-key-byok</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/key-management-system/enterprise-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/key-management-system/key-management-service</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/key-management-system/secrets-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/post-quantum-cryptography</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/post-quantum-cryptography/crypto-agility</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/post-quantum-cryptography/pqc</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/public-key-infrastructure</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/public-key-infrastructure/iot-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/public-key-infrastructure/pki</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/security-posture-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/security-posture-management/cloud-security-posture-management-cspm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/security-posture-management/data-security-posture-management-dspm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/tokenization/data-masking</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/tokenization/data-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/tokenization/format-preserving-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/zero-trust</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/zero-trust/zero-trust-architecture</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/zero-trust/zero-trust-principle</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/faq/zero-trust/zero-trust-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/intel-sgx</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/agreements-and-standard-terms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/fortanix-cloud-tos</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/fortanix-cloud-tos/sla</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/fortanix-cloud-tos/sla/dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/fortanix-cloud-tos/toms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/fortanix-eula</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/privacy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/privacy/ccpa</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/privacy/unsubscribe-or-delete-personal-data</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/terms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/terms-of-purchase</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/legal/terms/sdk-license</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/april-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/april-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/august-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/august-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/december-2022</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/december-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/december-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/february-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/february-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/february-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/february-2026</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/january-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/january-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/july-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/july-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/july-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/june-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/june-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/june-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/march-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/march-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/march-2026</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/may-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/may-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/november-2022</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/november-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/november-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/october-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/october-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/september-2023</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/september-2024</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/newsletters/september-2025</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/partners</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/partners/fortanix-with-azure-and-intel</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/partners/register-a-deal</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/armet-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/confidential-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/confidential-computing-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/bring-your-own-key</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/cloud-data-control</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/data-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/dsm-accelerator</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/ekm-for-gcp</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/filesystem-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/hardware-security-module</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/hsm-gateway</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/hsm-modernization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/key-management-service</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/multicloud-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/secrets-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/secure-business-logic</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/secure-your-code-signing-process</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/transparent-database-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/data-security-manager/xks-for-aws</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/key-insight</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/runtime-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/platform/runtime-encryption/enclave-development-platform</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/request-a-demo</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/case-study</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/case-study/elastx-testimonial-on-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/case-study/iexec-testimonial-on-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/case-study/nec-partners-with-fortanix-for-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/checklist</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/checklist/fortanix-for-digital-operational-resilience-act</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/checklist/fortanix-for-pci-dss-4-0-compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/checklist/how-fortanix-can-help-meet-essential-cybersecurity-controls-ecc-1-2018</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/checklist/how-fortanix-helps-agencies-deliver-on-executive-order-14144</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/amazon-web-services-aws-cloud-key-management-with-fortanix</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/cloud-data-control</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/confidential-computing-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/data-security-for-nutanix-hyper-converged-infrastructure</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fips-140-2-level-3-hardware-security-module-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-data-security-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-data-security-manager-one-pager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-dsm-keyfactor-datasheet</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-external-key-control-and-management-for-google-cloud-platform-gcp</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-hsm-fx3400-appliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-runtime-encryption-appliance-fx2200-series-i</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-runtime-encryption-appliance-fx2200-series-ii</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/fortanix-support-program-technical-support-datasheet</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/hsm-gateway-simplifying-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/runtime-encryption-platform</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/runtime-encryption-platform-techbrief</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/datasheets/technical-support-program-for-saas</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/10-key-management-best-practices</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/10-questions-to-ask-when-choosing-hsm-as-a-service-provider</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/5-tips-to-bolster-your-multicloud-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/a-guide-to-data-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/a-report-on-streamlining-data-security-strategies-through-key-management-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/a-report-on-the-impact-of-cyber-threats-leading-to-business-data-loss</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/cloud-data-security-challenges-and-solution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/data-security-amid-the-pandemic-getting-it-done-vs-doing-it-right</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/deep-dive-into-enterprise-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/drowning-in-multicloud-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/elevating-your-google-cloud-security-with-external-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/the-hsm-is-dead-long-live-modern-hardware-security-modules</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/understanding-credit-card-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/what-is-new-with-pci-dss-4-0</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/why-dsm-saas</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/infographics/your-data-is-not-safe-quantum-readiness-is-urgent</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/paypal-demonstrates-fortanix-and-google-cloud-external-key-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/armet-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/automating-certificate-management-and-secure-key-orchestration-with-fortanix-and-appviewx</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/aws-external-key-store-xks-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/bolster-cyberark-privileged-access-manager-solutions-with-fortanix-data-security-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/cloud-scale-hsm-and-key-management-for-big-ip-and-nginx-tls</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/control-encryption-across-hybrid-multicloud-environments</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/customer-success-services-for-saas</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/data-masking-and-tokenization</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/data-security-manager-accelerator</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/database-encryption-simplified-key-management-across-global-databases</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/digital-operational-resilience-act-dora</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/embed-cryptographic-trust-across-the-software-delivery-pipelines</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/filesystem-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-application-level-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-confidential-ai</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-custodial-warm-wallet</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-data-security-manager-for-vmware-sovereign-cloud</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-dsm-and-cyberark-enterprise-password-vault</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-dsm-mocana-iot-security-platform</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-dsm-ssh-ca</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-dsm-zettaset-xcrypt-data-encryption-platform</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-enclave-manager-and-runtime-encryption-rte</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-for-federal-government</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-for-google-workspace</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-for-imperva</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-for-rubrik</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-for-servicenow</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-for-snowflake</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-for-venafi</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-geobridge-joint-solution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-hardware-security-module-hsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-ignite-one-time-signer</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-key-insight</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-launchnodes-solution-for-cosmos-and-tendermint-blockchains</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-randtronics-joint-solution</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-secrets-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-secure-manufacturing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-signing-provider-for-tmkms</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/fortanix-solutions-for-microsoft-azure</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/how-fortanix-helps-meet-apra-cps-230-guideline</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/intel-and-fortanix-confidential-computing-manager-joint-solution-brief</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/intelligent-data-security-at-scale-with-fortanix-and-bigid</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/mariadb-database-encryption-with-fortanix-dsm</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/multi-party-collaboration</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/pervasive-data-protection-the-foundation-of-digital-trust</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/professional-services</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/secure-code-signing-for-devops-and-security-teams-with-appviewx-sign</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/secure-key-management-for-blockchain-applications</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/secure-manufacturing-of-iot-devices</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/secure-scalable-key-management-fornetix-key-orchestration</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/secure-your-data-now-from-the-inevitable-quantum-risks</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/securing-cohesity-data-at-rest-encryption-with-fortanix-data-security-manager</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/securing-data-at-scale-using-fortanix-and-imperva</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/securing-elasticsearch-with-confidential-computing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/shardsecure-integrates-with-fortanix-for-advanced-data-protection</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/simplified-hybrid-cloud-and-multi-cloud-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/unlocking-hidden-potential-of-data-privacy-preserving-analytics</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/using-fortanix-data-security-manager-with-hashicorp-vault</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/resources/solution-briefs/using-fortanix-dsm-with-oracle-tde</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/search-results</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/cps-234</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/digital-operational-resilience-act-dora</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/gdpr</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/glba</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/hipaa</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/pci-dss</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/philippines-data-privacy-act</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/saudi-arabia-essential-cybersecurity-controls-ecc</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/schrems</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/sebi-framework-for-cloud-services-adoption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/compliance/sox</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/data-encryption</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/enterprise-key-management</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/industry</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/industry/data-security-for-banking-and-financial-services</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/industry/data-security-for-healthcare</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/industry/data-security-for-tech</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/industry/government-data-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/industry/secure-manufacturing</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/appviewx</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/aws</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/bigid</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/confidential-ai-for-bosch-aishield</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/fortanix-for-google-workspace-security</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/google-cloud-platform</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/keyfactor</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/servicenow</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/snowflake</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/integrations/vmware</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/role</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/role/appdev-teams</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/role/cxos</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/role/data-teams</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/role/security-teams</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/use-case</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/use-case/build-resilience-with-multi-sourced-quantum-entropy</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/use-case/confidential-data-search</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/use-case/legacy-to-cloud-infrastructure-migration</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/use-case/post-quantum-cryptography</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/use-case/regulatory-compliance</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/solutions/use-case/secure-data-driven-innovation</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/start-your-free-trial</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/subscribe-now</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/support</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/support/professional-services</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/support/technical-support-program</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/trust-center</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/trust-center/pgp-key</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
  <url>
    <loc>https://www.fortanix.com/university</loc>
    <lastmod>2026-04-03T22:40:09.218Z</lastmod>
  </url>
</urlset>