<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.invary.com</loc>
    </url>
    <url>
        <loc>https://www.invary.com/contact</loc>
    </url>
    <url>
        <loc>https://www.invary.com/learn</loc>
    </url>
    <url>
        <loc>https://www.invary.com/solutions</loc>
    </url>
    <url>
        <loc>https://www.invary.com/partners</loc>
    </url>
    <url>
        <loc>https://www.invary.com/invary-runtime-integrity</loc>
    </url>
    <url>
        <loc>https://www.invary.com/cis</loc>
    </url>
    <url>
        <loc>https://www.invary.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.invary.com/terms-conditions</loc>
    </url>
    <url>
        <loc>https://www.invary.com/runtime-integrity</loc>
    </url>
    <url>
        <loc>https://www.invary.com/runtime-integrity-webinar</loc>
    </url>
    <url>
        <loc>https://www.invary.com/on-premise-software-license-agreement</loc>
    </url>
    <url>
        <loc>https://www.invary.com/software-license-agreement</loc>
    </url>
    <url>
        <loc>https://www.invary.com/apt-webinar</loc>
    </url>
    <url>
        <loc>https://www.invary.com/runtime-integrity-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.invary.com/runtime-integrity-apt</loc>
    </url>
    <url>
        <loc>https://www.invary.com/register</loc>
    </url>
    <url>
        <loc>https://www.invary.com/school-district-case-study</loc>
    </url>
    <url>
        <loc>https://www.invary.com/sled-case-study</loc>
    </url>
    <url>
        <loc>https://www.invary.com/free-trial</loc>
    </url>
    <url>
        <loc>https://www.invary.com/msp</loc>
    </url>
    <url>
        <loc>https://www.invary.com/local-government-case-study</loc>
    </url>
    <url>
        <loc>https://www.invary.com/telecom-case-study</loc>
    </url>
    <url>
        <loc>https://www.invary.com/legal-case-study</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/an-infrastructure-for-faithful-execution-of-remote-attestation-protocols</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/better-model-for-trust-in-live-systems</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/breaking-the-cycle</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/design-and-formal-verification-of-a-copland-based-attestation-protocol</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/designing-trustworthy-layered-attestations</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/detecting-system-compromise</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/ebpf-rootkit-or-edr</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/edr-killers</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/flexible-mechanisms-for-remote-attestation</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/formally-verified-bundling-and-appraisal-of-evidence-for-layered-attestations</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/how-nsa-technology-powers-invary</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/improving-hpc-incident-response-with-runtime-integrity-in-elasticsearch</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/integrity-an-overlooked-foundation-of-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/invary-and-carahsoft-partner</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/invary-seed-round</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/invary-welcomes-former-nist-cybersecurity-chief-donna-dodson-to-board-of-directors</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/new-foundation-redefining-security-with-runtime-integrity</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/orchestrating-layered-attestations</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/rootkit-or-edr</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/runtime-integrity-measurement-overview</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/securing-linux-and-windows-kernels-against-runtime-apts</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/vibrint-and-invary-join-forces-to-advance-kernel-level-zero-trust-solutions</loc>
    </url>
    <url>
        <loc>https://www.invary.com/articles/why-invary-a-cybersecurity-veterans-perspective</loc>
    </url>
    <url>
        <loc>https://www.invary.com/usecases/cloud-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.invary.com/usecases/confidential-computing</loc>
    </url>
    <url>
        <loc>https://www.invary.com/usecases/dod-and-ic</loc>
    </url>
    <url>
        <loc>https://www.invary.com/usecases/hpc-ai</loc>
    </url>
    <url>
        <loc>https://www.invary.com/usecases/kernel-security</loc>
    </url>
    <url>
        <loc>https://www.invary.com/usecases/zero-trust</loc>
    </url>
</urlset>