<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://www.rapidfiretools.com/</loc><lastmod>2025-12-18T00:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cjis-security-policy/</loc><lastmod>2025-12-18T00:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/compliance-manager-grc/</loc><lastmod>2025-12-18T00:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/product-briefs-datasheets/</loc><lastmod>2025-12-18T00:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/</loc><lastmod>2025-12-18T00:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/recording-cybersecurity-dream-team-msps-holiday-bingo/</loc><lastmod>2025-12-05T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/network-detective-pro/</loc><lastmod>2025-12-05T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/on-demand-webinars/</loc><lastmod>2025-12-05T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/network-detective-pro-cybersecurity-sales-webinar/</loc><lastmod>2025-10-09T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/5-things-msps-and-smbs-need-to-know-about-the-new-hph-cpgs/</loc><lastmod>2025-09-03T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/</loc><lastmod>2025-09-03T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/healthcare/</loc><lastmod>2025-09-03T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/network-detective-pro/</loc><lastmod>2025-08-25T09:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/the-human-impact-of-network-detective-pro-stories-from-the-frontlines/</loc><lastmod>2025-08-25T09:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/hph-cybersecurity-performance-goals/</loc><lastmod>2025-08-07T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/guided-smb1001-readiness-and-compliance/</loc><lastmod>2025-08-06T00:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/turn-hidden-network-risks-into-revenue-on-demand/</loc><lastmod>2025-08-05T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/prospect-scan-close-how-vulscan-simplifies-selling-cybersecurity-ondemand/</loc><lastmod>2025-07-11T00:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vulscan/</loc><lastmod>2025-07-11T00:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/compliance/</loc><lastmod>2025-06-18T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/why-compliance-as-a-service-is-your-secret-weapon-for-growth/</loc><lastmod>2025-06-18T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/turn-summer-slumps-into-sales-wins-with-network-detective-pro-audit-on-demand/</loc><lastmod>2025-06-16T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/cybersecurity/</loc><lastmod>2025-05-29T05:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/unlocking-the-vciso-opportunity-starts-with-smarter-risk-assessments/</loc><lastmod>2025-05-29T05:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/audit-compliance-highlights-kaseya-connect-2025/</loc><lastmod>2025-05-28T10:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/infographics-checklists/</loc><lastmod>2025-05-22T00:04:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/the-msp-risk-assessment-checklist-to-turn-blind-spots-into-business-wins/</loc><lastmod>2025-05-22T00:04:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/beyond-scans-how-combining-vulnerability-scanning-and-network-pentesting-closes-critical-security-gaps-registration/</loc><lastmod>2025-05-22T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/your-roadmap-to-continuous-compliance-for-every-customer-in-10-minutes-or-less/</loc><lastmod>2025-05-21T00:00:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/continuous-compliance-monitoring/</loc><lastmod>2025-05-08T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/why-smart-msps-are-launching-continuous-compliance-for-their-clients-in-under-10-minutes/</loc><lastmod>2025-05-08T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/from-risk-assessments-to-recurring-revenue-recording/</loc><lastmod>2025-04-13T00:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/compliance-manager-grc/</loc><lastmod>2025-03-24T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/small-business-leaders-and-compliance-experts-convene-at-kaseyas-inaugural-compliance-summit/</loc><lastmod>2025-03-24T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/introducing-risk-manager-a-smarter-approach-to-it-security-and-compliance-risk-management/</loc><lastmod>2025-03-20T06:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/introducing-compliance-monitor-a-groundbreaking-new-feature-for-compliance-manager-grc/</loc><lastmod>2025-03-14T00:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/how-two-msps-transformed-compliance-chaos-into-profits-real-success-stories-on-demand/</loc><lastmod>2025-03-13T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/a-match-made-in-cybersecurity-heaven-ondemand/</loc><lastmod>2025-02-05T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/four-step-sales-success/</loc><lastmod>2025-01-22T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/msp/</loc><lastmod>2025-01-19T00:00:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/transform-your-msp-with-consultative-selling/</loc><lastmod>2025-01-19T00:00:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/leveraging-the-spin-sales-process-for-msps/</loc><lastmod>2025-01-06T10:39:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/msp-resources/</loc><lastmod>2025-01-06T10:39:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/business-management/</loc><lastmod>2024-12-30T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/why-you-need-to-invest-in-compliance-in-2025/</loc><lastmod>2024-12-30T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/becoming-compliance-ready-2025-recording/</loc><lastmod>2024-12-16T00:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/security-and-compliance-data-2024/</loc><lastmod>2024-12-10T00:41:46+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/compliance-checklist-2025/</loc><lastmod>2024-12-02T10:07:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/automating-compliance-management-path-profitability-msps/</loc><lastmod>2024-11-26T10:32:13+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/framework-/-standards/</loc><lastmod>2024-11-26T00:32:13+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/importance-of-cis-controls-blog/</loc><lastmod>2024-11-26T00:32:13+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/key-it-vulnerability-management-trends/</loc><lastmod>2024-11-06T10:10:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/network-detective-pro-next-generation-webinar/</loc><lastmod>2024-11-05T00:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/integration/</loc><lastmod>2024-10-29T00:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-detective-pro-audit-integration/</loc><lastmod>2024-10-29T00:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cyber-hawk/</loc><lastmod>2024-10-20T12:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cyber-security-resources/</loc><lastmod>2024-10-20T12:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/whitepapers-other-resources/</loc><lastmod>2024-10-20T12:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cybersecurity-best-practices-vulnerability-management/</loc><lastmod>2024-10-15T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/internal-and-external-vulnerability-scan/</loc><lastmod>2024-10-06T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/vulnerability-scans/</loc><lastmod>2024-10-06T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/nist-2/</loc><lastmod>2024-09-27T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/nist-2-network-detective-implement-identify-detect-functions/</loc><lastmod>2024-09-27T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cmgrc-datasheet-eu-nis2/</loc><lastmod>2024-09-13T10:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cmmc-critical-webinar/</loc><lastmod>2024-09-05T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/insider-threats/</loc><lastmod>2024-08-09T12:44:53+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/threats/</loc><lastmod>2024-08-09T12:44:53+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/insider-threats/</loc><lastmod>2024-08-09T12:44:53+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/network-security/</loc><lastmod>2024-08-06T10:10:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/threat-detection/</loc><lastmod>2024-08-06T10:10:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/effective-threat-detection-response/</loc><lastmod>2024-08-06T10:10:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/maximizing-productivity-and-roi-webinar/</loc><lastmod>2024-07-29T00:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/summer-security-checklist/</loc><lastmod>2024-07-24T10:10:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/compliance-management/</loc><lastmod>2024-07-12T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-pci-compliance/</loc><lastmod>2024-07-12T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/compliance-management-caas-approach/</loc><lastmod>2024-07-08T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/it-security-compliance-eguide/</loc><lastmod>2024-06-28T10:07:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/soc/</loc><lastmod>2024-06-11T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-soc-2-compliance/</loc><lastmod>2024-06-11T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/navigate-soc-2-compliance-webinar/</loc><lastmod>2024-06-05T00:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/cloud-environment/</loc><lastmod>2024-06-04T00:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/cloud-migration/</loc><lastmod>2024-06-04T00:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/coud-readiness-assessment/</loc><lastmod>2024-06-04T00:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/cloud-readiness-assessment/</loc><lastmod>2024-06-04T00:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/ebooks/</loc><lastmod>2024-06-03T02:02:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/secrets-to-increase-expansion-ebook/</loc><lastmod>2024-06-03T02:02:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/cybersecurity-maturity-model-certification-cmmc/</loc><lastmod>2024-05-27T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-cmmc-cybersecurity-maturity-model-certification/</loc><lastmod>2024-05-27T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/hipaa/</loc><lastmod>2024-05-16T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/hipaa-cybersecurity-requirements-security-rule/</loc><lastmod>2024-05-16T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/dont-wait-for-disaster-webinar/</loc><lastmod>2024-05-10T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/frameworks/standards/</loc><lastmod>2024-04-29T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/it-compliance/</loc><lastmod>2024-04-29T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/nist/</loc><lastmod>2024-04-29T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/nist-800-171-a-standard-guide/</loc><lastmod>2024-04-29T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/rapidfire-tools/</loc><lastmod>2024-04-29T00:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/network-assessment/</loc><lastmod>2024-04-26T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/network-mapping/</loc><lastmod>2024-04-26T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-discovery-mapping-tools-features/</loc><lastmod>2024-04-26T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/cyberthreats/</loc><lastmod>2024-04-18T01:00:20+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/vulnerability-scanning/</loc><lastmod>2024-04-18T01:00:20+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-vulnerability-management-lifecycle/</loc><lastmod>2024-04-18T01:00:20+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/it-management/</loc><lastmod>2024-03-29T01:00:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/nist-csf-2-0/</loc><lastmod>2024-03-29T01:00:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/webinar-recording-risk-cybersecurity/</loc><lastmod>2024-03-28T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/common-network-vulnerabilities/</loc><lastmod>2024-03-27T01:00:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/data-breach/</loc><lastmod>2024-03-27T01:00:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/vulnerability/</loc><lastmod>2024-03-27T01:00:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/compliance-manager-grc/interactive-demo/</loc><lastmod>2024-03-08T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/network-detective-pro/interactive-demo/</loc><lastmod>2024-03-08T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/on-demand-demos/</loc><lastmod>2024-03-08T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vulscan/interactive-demo/</loc><lastmod>2024-03-08T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/interactive-demo/</loc><lastmod>2024-03-01T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/itaas-offering-with-rapidfire-tools/</loc><lastmod>2024-02-29T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/information-technology/</loc><lastmod>2024-02-29T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/it-risk-management/</loc><lastmod>2024-02-29T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/saas/</loc><lastmod>2024-02-29T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/webinar-expand-msp-business-with-compliance/</loc><lastmod>2024-02-28T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/cloud-vulnerability-management/</loc><lastmod>2024-02-28T00:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cmgrc-demo-od/</loc><lastmod>2024-02-27T10:07:56+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/network-vulnerability/</loc><lastmod>2024-02-26T17:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-vulnerability-scanning/</loc><lastmod>2024-02-26T17:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/risk-management/</loc><lastmod>2024-02-20T00:46:44+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/information-security-risk-management/</loc><lastmod>2024-02-20T00:46:44+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/ultimate-solution-vulscan-vulnerability-management/</loc><lastmod>2024-02-15T03:04:46+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/videos/</loc><lastmod>2024-02-15T03:04:46+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/drive-business-growth-with-risk-management-solution/</loc><lastmod>2024-02-15T00:46:44+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/it-risk/</loc><lastmod>2024-02-15T00:46:44+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/it-security-compliance/</loc><lastmod>2024-01-31T00:46:44+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/webinar-recording-demonstrate-value-to-clients/</loc><lastmod>2024-01-16T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/webinar-recording-turn-vulnerabilities-into-opportunities/</loc><lastmod>2024-01-16T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/it-professionals-survey-insights-ebook/</loc><lastmod>2024-01-09T02:02:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/offering-cmmc-as-a-service/session-3/</loc><lastmod>2024-01-01T10:10:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/offering-cmmc-as-a-service/session-1/</loc><lastmod>2024-01-01T10:10:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/offering-cmmc-as-a-service/session-4/</loc><lastmod>2024-01-01T10:10:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/offering-cmmc-as-a-service/</loc><lastmod>2024-01-01T10:10:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/offering-cmmc-as-a-service/session-2/</loc><lastmod>2024-01-01T10:10:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/how-to-draw-a-network-diagram/</loc><lastmod>2023-12-22T09:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/layered-risk-management/</loc><lastmod>2023-12-22T09:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/network-diagrams/</loc><lastmod>2023-12-22T09:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/webinar-recording-new-network-detective-pro/</loc><lastmod>2023-12-06T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/hipaa-compliance-an-rx-for-it-professionals/</loc><lastmod>2023-11-30T06:04:29+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/hipaa-compliance-an-rx-for-msps/</loc><lastmod>2023-11-30T06:04:29+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cmmc-masterclass-overview/</loc><lastmod>2023-11-30T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/manage-it-risk-with-rapidfire-tools-explainer-video/</loc><lastmod>2023-11-16T03:04:42+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/your-role-in-cmmc/</loc><lastmod>2023-11-15T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cmmc-market-opportunities/</loc><lastmod>2023-11-09T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/expand-your-msp-business-with-a-compliance-service-portfolio/</loc><lastmod>2023-11-03T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-security/</loc><lastmod>2023-10-27T09:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/win-security-war-webinar/</loc><lastmod>2023-10-18T16:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/are-you-making-these-common-vulnerability-management-mistakes/</loc><lastmod>2023-10-10T08:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/it-security/</loc><lastmod>2023-10-10T08:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/risk-assessments/</loc><lastmod>2023-09-29T06:35:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/talking-about-it-assessments-made-easy/</loc><lastmod>2023-09-29T06:35:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/hevs-data-sheet/</loc><lastmod>2023-09-21T07:09:40+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/detecting-critical-network-changes-is-essential-to-your-it-security/</loc><lastmod>2023-09-20T09:49:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/case-studies/</loc><lastmod>2023-09-13T12:09:09+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/case-studies/ame-group/</loc><lastmod>2023-09-13T12:09:09+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/beat-hackers-vulscan/</loc><lastmod>2023-08-17T07:08:22+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/complete-it-risk-management-toolkit/</loc><lastmod>2023-08-08T01:08:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cyber-hawk-data-sheet-download/</loc><lastmod>2023-08-07T10:08:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/effective-it-risk-management-safeguards-your-digital-assets/</loc><lastmod>2023-07-31T09:43:48+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/buyers-guides/</loc><lastmod>2023-07-12T11:07:18+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-bg-vm/</loc><lastmod>2023-07-12T11:07:18+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-demo-od/</loc><lastmod>2023-07-12T10:07:56+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/get-on-demand-demo/</loc><lastmod>2023-07-12T10:07:41+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/it-buyers-guide-network-assessments/</loc><lastmod>2023-07-12T10:07:38+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/network-detective-pro-on-demand-demo/</loc><lastmod>2023-07-12T10:07:13+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/compliance-it-assurance-software-buyers-guide/</loc><lastmod>2023-07-12T09:33:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/complete-checklist-for-vulnerability-discovery/</loc><lastmod>2023-07-11T10:07:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/cybersecurity-risk-assessment/</loc><lastmod>2023-06-19T07:58:06+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/layered-risk-management-webinar/</loc><lastmod>2023-06-14T03:06:55+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/manage-vulnerabilities-in-minutes/</loc><lastmod>2023-06-01T06:06:52+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-security-assessment/</loc><lastmod>2023-05-19T11:55:45+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cyber-attack-risk-assessment-datasheet-download/</loc><lastmod>2023-05-09T10:05:18+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/it-professional-checklist-for-network-discovery/</loc><lastmod>2023-04-11T07:04:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/vulnerability-management/</loc><lastmod>2023-04-10T09:12:57+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/it-risk-assessment/</loc><lastmod>2023-04-10T09:12:57+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/learn-to-reduce-it-environment-risks-with-vulscan/</loc><lastmod>2023-04-10T09:04:31+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/catch-vulnerabilities-before-hackers-do/</loc><lastmod>2023-03-29T06:32:06+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/cyber-hawk-helps-the-ame-group-offer-unparalleled-internal-threat-detection-services/</loc><lastmod>2023-03-28T10:30:17+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-detective-pro-strengthening-an-msps-services-portfolio/</loc><lastmod>2023-03-24T10:04:40+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/red-team-vs-blue-team/</loc><lastmod>2023-03-20T11:24:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/bridge-technology-gap-it-security-program-webinar/</loc><lastmod>2023-03-13T11:03:35+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/it-risk-management/</loc><lastmod>2023-03-13T06:41:46+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/it-trends-rapidfire-tools/</loc><lastmod>2023-02-23T02:02:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/business-enablement/</loc><lastmod>2023-02-21T06:58:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/sales-marketing/</loc><lastmod>2023-02-21T06:58:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulscan-helps-you-land-new-clients-and-upsell-existing-customers/</loc><lastmod>2023-02-21T06:58:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/network-detective-pro-executive-reports-datasheet-tu/</loc><lastmod>2023-02-15T07:02:14+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/automating-vulnerability-management/</loc><lastmod>2023-02-14T12:02:24+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/mspexecutivedatasheet-tu/</loc><lastmod>2023-02-14T01:02:39+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/how-one-msp-partnered-with-rft-to-build-their-business/</loc><lastmod>2023-02-13T06:33:45+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/rft-customer-insight-webinar-ame-group/</loc><lastmod>2023-02-10T11:02:49+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/how-to-evaluate-field-techs/</loc><lastmod>2023-01-23T12:06:14+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/kpis/</loc><lastmod>2023-01-23T12:06:14+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/operational-efficiency/</loc><lastmod>2023-01-23T12:06:14+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-assessments-remote-monitoring/</loc><lastmod>2022-12-25T16:02:17+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/remote-monitoring-and-management-rmm/</loc><lastmod>2022-12-25T16:02:17+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/stop-the-data-leaks-caused-by-internal-threats/</loc><lastmod>2022-12-09T08:12:50+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/webinar-grow-msp-business-network-visibility/</loc><lastmod>2022-12-08T07:12:41+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulnerability-management-should-be-a-primary-offering/</loc><lastmod>2022-12-05T01:00:22+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/onboard-faster-and-start-earning-more/</loc><lastmod>2022-12-04T01:00:55+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-ndprodata-itdept-tu/</loc><lastmod>2022-11-28T01:11:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/make-it-data-work-for-you-webinar/</loc><lastmod>2022-11-23T07:11:18+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/improve-business-by-giving-report-cards/</loc><lastmod>2022-11-20T01:00:41+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-assessments-are-good-for-business/</loc><lastmod>2022-11-14T01:00:27+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/exchange-server/</loc><lastmod>2022-11-10T15:24:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/on-premise-exchange-servers-a-growing-target-for-cyberattacks/</loc><lastmod>2022-11-10T15:24:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/infrastructure/</loc><lastmod>2022-11-10T15:24:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/defining-vulnerability-scanning/</loc><lastmod>2022-11-06T01:00:38+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/whats-your-it-threat-threshold/</loc><lastmod>2022-10-31T01:00:16+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/stop-hacks-in-tracks-rft/</loc><lastmod>2022-10-26T06:10:40+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-vslongbro-dat-tu/</loc><lastmod>2022-10-21T05:10:49+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/rft-it-security-checklist/</loc><lastmod>2022-10-18T10:10:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/rft-it-discovery-eguide/</loc><lastmod>2022-10-18T07:10:56+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/webinar-harden-your-network-vulnerability-management/</loc><lastmod>2022-09-22T09:09:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/erick-simpson-network-detective-webinar/</loc><lastmod>2022-09-16T06:09:17+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/biggest-benefits-of-it-assessments/</loc><lastmod>2022-09-06T10:39:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/customer-spotlight-cyfor-secure/</loc><lastmod>2022-08-26T11:08:42+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/customer-spotlight-fortnet-uk/</loc><lastmod>2022-08-25T10:08:31+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/it-assessments-network-detective-pro/</loc><lastmod>2022-08-22T01:08:59+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vulnerability-management-its-all-about-security/</loc><lastmod>2022-08-18T12:08:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/the-elements-of-risk/</loc><lastmod>2022-08-08T01:00:29+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/what-it-pros-must-know-about-vulnerability-scanning/</loc><lastmod>2022-08-02T09:08:19+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/patch-management/</loc><lastmod>2022-08-02T01:00:47+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/software-updates-are-critical/</loc><lastmod>2022-08-02T01:00:47+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/defining-network-vulnerability-scanning/</loc><lastmod>2022-08-01T01:00:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulnerability-scanning-helps-keep/</loc><lastmod>2022-07-26T01:00:17+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/top-ten-ways-win-new-clients-it-assessments/</loc><lastmod>2022-07-22T11:07:30+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/ny-dfs/</loc><lastmod>2022-07-18T13:21:03+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-nydfs-compliance/</loc><lastmod>2022-07-18T13:21:03+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulnerability-management-lifecyle/</loc><lastmod>2022-07-11T01:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/seven-missing-keys-to-msp-success/</loc><lastmod>2022-07-06T01:07:35+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/implement-vulnerability-management/</loc><lastmod>2022-07-06T01:00:46+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/security-assessments/</loc><lastmod>2022-07-05T12:08:51+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/cmmc-compliance/</loc><lastmod>2022-07-04T01:00:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-vulnerability-management/</loc><lastmod>2022-06-29T01:00:20+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/identity-access-management-iam/</loc><lastmod>2022-06-28T01:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/microsoft-azure/</loc><lastmod>2022-06-28T01:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/azure-ad-reports/</loc><lastmod>2022-06-28T01:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/nist-csf-compliance/</loc><lastmod>2022-06-27T01:00:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/cyber-essentials-and-cyber-essentials-plus-compliance/</loc><lastmod>2022-06-22T01:00:10+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/security-awareness-training/</loc><lastmod>2022-06-22T01:00:10+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-pro-scan-ebook/</loc><lastmod>2022-06-20T06:06:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-a-vulnerability-in-cybersecurity/</loc><lastmod>2022-06-20T01:00:01+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/building-a-great-it-defense/</loc><lastmod>2022-06-15T02:06:35+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/hipaa-compliance-reaches-far-beyond-just-healthcare-companies/</loc><lastmod>2022-06-15T01:00:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/legal-compliance/</loc><lastmod>2022-06-15T01:00:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/protect-your-clients-with-network-assessments/</loc><lastmod>2022-06-13T01:00:41+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/network-discovery/</loc><lastmod>2022-06-08T10:52:24+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/turn-data-into-dollars-webinar/</loc><lastmod>2022-06-08T05:06:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/remote-monitoring-management-vs-network-assessments/</loc><lastmod>2022-06-07T01:00:31+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/hidden-msp-threat-great-unknowns-webinar/</loc><lastmod>2022-06-03T09:06:39+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/automate-network-discovery-and-documentation/</loc><lastmod>2022-05-31T01:00:51+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-is-vulnerability-scanning-and-what-does-it-do/</loc><lastmod>2022-05-25T01:00:22+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/smb-it-networks-more-vulnerable-than-you-think/</loc><lastmod>2022-05-18T01:00:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/solving-great-msp-mystery-webinar/</loc><lastmod>2022-05-13T09:05:30+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/defining-the-msp-client-lifecycle/</loc><lastmod>2022-05-04T01:00:44+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/it-audits/</loc><lastmod>2022-04-28T08:51:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/stay-ahead-hackers-with-vulnerability-managment/</loc><lastmod>2022-04-27T04:04:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulnerability-management-is-key-to-it-security/</loc><lastmod>2022-04-27T01:02:51+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/create-more-revenue-using-assessments/</loc><lastmod>2022-04-26T01:00:57+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/protect-yourself-and-your-clients-before-as-well-as-after-a-breach/</loc><lastmod>2022-04-25T01:00:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/playing-the-pricing-game-for-profit/</loc><lastmod>2022-04-19T01:01:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-erick-simpson-vulnerability-management-webinar/</loc><lastmod>2022-04-14T04:04:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/making-the-case-for-vulnerability-scans/</loc><lastmod>2022-04-06T01:00:16+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulnerability-scanning/</loc><lastmod>2022-04-04T11:00:17+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/implementing-essential-8-webinar/</loc><lastmod>2022-04-01T02:04:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/patches-arent-perfect/</loc><lastmod>2022-03-25T12:00:06+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/top-5-cybercriminal-access-points/</loc><lastmod>2022-03-16T01:00:47+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/hipaa-compliance-services-the-rx-for-lagging-sales/</loc><lastmod>2022-03-14T01:00:49+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/contract-renewal-is-key-to-increasing-msp-revenue/</loc><lastmod>2022-03-10T01:00:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/profitable-vulnerability-management-for-msps/</loc><lastmod>2022-03-09T01:00:47+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/cyber-insurance/</loc><lastmod>2022-03-08T01:00:01+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/help-your-clients-maximize-cyber-liability-insurance-benefits/</loc><lastmod>2022-03-08T01:00:01+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/best-weapons-for-nist-framework-compliance/</loc><lastmod>2022-03-03T01:00:29+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/how-to-measure-vulnerability-management-roi-and-ensure-profits/</loc><lastmod>2022-03-01T01:00:38+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/progress-reports-how-msps-can-prove-their-value-to-clients/</loc><lastmod>2022-02-22T01:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/understanding-the-elements-of-risk/</loc><lastmod>2022-02-21T01:00:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-msps-need-most-from-a-vulnerability-management-platform/</loc><lastmod>2022-02-17T01:00:54+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/understanding-the-elements-of-risk-emphasizes-the-need-for-vulnerability-management/</loc><lastmod>2022-02-09T01:00:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulnerability-management/</loc><lastmod>2022-02-04T02:12:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/maximize-the-value-of-the-vulnerability-management-lifecycle/</loc><lastmod>2022-02-01T01:00:06+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/compliance-as-a-service-briefing/</loc><lastmod>2022-01-31T12:01:48+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/hipaa-compliance-services-arent-only/</loc><lastmod>2022-01-25T01:00:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/how-to-automate-ongoing-network-discovery-and-documentation/</loc><lastmod>2022-01-10T01:00:22+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/why-compliance-makes-for-good-business/</loc><lastmod>2022-01-07T01:00:01+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/vulnerability-scanning-what-it-is-and-what-it-does/</loc><lastmod>2022-01-05T01:00:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-vmaasmoney-eb/</loc><lastmod>2022-01-04T12:01:10+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-vshowitworks-eb/</loc><lastmod>2022-01-04T01:01:32+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-vmaasprimer-eb/</loc><lastmod>2022-01-04T01:01:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/why-msps-smb-clients-need-cyber-insurance/</loc><lastmod>2021-12-29T01:00:38+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-pvsbrief-dat-tu/</loc><lastmod>2021-12-17T10:12:10+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-euinfogr/</loc><lastmod>2021-12-02T11:12:48+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-vmaas-wp/</loc><lastmod>2021-12-02T11:12:03+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-cmukgdpr-dat-tu/</loc><lastmod>2021-11-29T10:11:07+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cmmc-big-opportunity/</loc><lastmod>2021-10-27T12:10:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-usethenews-cs/</loc><lastmod>2021-10-27T10:10:19+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-clientloy-ebook/</loc><lastmod>2021-10-27T06:10:39+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/the-revelations-of-network-assessments/</loc><lastmod>2021-10-25T23:29:31+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-10myths-ebook/</loc><lastmod>2021-10-20T12:10:02+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vs-v-maas-videos-od/</loc><lastmod>2021-10-20T10:10:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-quantrisk-wp/</loc><lastmod>2021-10-11T02:10:29+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-policybelief-wp/</loc><lastmod>2021-10-06T02:10:58+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-3waystoprod-wp/</loc><lastmod>2021-10-06T02:10:34+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/managing-unsupported-operating-systems/</loc><lastmod>2021-10-06T02:10:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/cmmc-still-a-big-opportunity-despite-delays-and-challenges/</loc><lastmod>2021-10-05T12:32:13+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/all-cyforsec-infog/</loc><lastmod>2021-09-15T02:09:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cyber-insurance-as-a-service/</loc><lastmod>2021-09-15T01:09:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-30cklist-dat-tu/</loc><lastmod>2021-09-09T12:09:11+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-ndprodata-wp-tu/</loc><lastmod>2021-09-09T12:09:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-cmoverview-tu/</loc><lastmod>2021-09-09T11:09:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-nistcsfpp-dat-tu/</loc><lastmod>2021-09-09T11:09:26+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-ndprogress-wp-tu/</loc><lastmod>2021-09-09T01:09:51+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-cmnistcsf-tu/</loc><lastmod>2021-09-02T12:09:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-cmintrule-dat-tu/</loc><lastmod>2021-09-02T11:09:42+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-cmgdpr-dat-tu/</loc><lastmod>2021-09-02T10:09:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-cmcli-dat-tu/</loc><lastmod>2021-09-01T11:09:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/adding-profits-with-compliance/</loc><lastmod>2021-09-01T02:09:23+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/hipaa-compliance-continues-to-grow/</loc><lastmod>2021-08-13T09:31:53+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/nis2-compliance/</loc><lastmod>2021-08-13T09:31:53+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/nis2-directive/</loc><lastmod>2021-08-13T09:31:53+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/nis2-directive/</loc><lastmod>2021-08-13T09:31:53+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/msp-survey/</loc><lastmod>2021-08-12T12:08:52+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/top-insider-threats/</loc><lastmod>2021-08-05T09:08:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-msplife5-ebook/</loc><lastmod>2021-07-29T10:07:31+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-msplife3-ebook/</loc><lastmod>2021-07-29T10:07:02+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/vulscan-datasheet-tu/</loc><lastmod>2021-07-27T10:07:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/why-clients-shouldnt-rely-on-software-patching-alone/</loc><lastmod>2021-07-17T18:10:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-msplife2-ebook/</loc><lastmod>2021-07-08T10:07:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/breakpoints-in-managed-services-lifecycle/</loc><lastmod>2021-06-23T12:06:19+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/sql-server/</loc><lastmod>2021-04-29T11:05:35+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/closer-look-at-sql-server-health-checks/</loc><lastmod>2021-04-29T11:05:35+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-managcloud-wp/</loc><lastmod>2021-04-28T06:04:59+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-cloud-simpsoncloud-webi-od/</loc><lastmod>2021-04-28T06:04:43+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/compliance-as-a-service-for-msps/</loc><lastmod>2021-04-28T06:04:29+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/amplify-security-services/</loc><lastmod>2021-04-28T06:04:14+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cm-cmmc-intrule-webi-od/</loc><lastmod>2021-04-28T05:04:59+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/finding-clients-with-compliance-manager/</loc><lastmod>2021-04-28T05:04:54+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/gdpr-compliance/</loc><lastmod>2021-04-28T05:04:48+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/security-pricing-guide/</loc><lastmod>2021-04-28T05:04:46+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nist-cyber-security-framework/</loc><lastmod>2021-04-28T05:04:38+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-allnddemo-od/</loc><lastmod>2021-04-28T05:04:20+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/cyber-hawk-on-demand-demo/</loc><lastmod>2021-04-28T05:04:13+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/build-a-cybersecurity-service/</loc><lastmod>2021-04-05T03:04:47+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/compliance-manager-for-gpdr/</loc><lastmod>2021-04-05T03:04:46+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/dominate-security-as-a-service-game/</loc><lastmod>2021-04-05T03:04:45+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/what-is-cyber-hawk/</loc><lastmod>2021-04-05T03:04:42+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-whyvid-demo/</loc><lastmod>2021-04-05T03:04:42+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/5-reasons-to-get-cyber-hawk/</loc><lastmod>2021-04-05T03:04:24+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/nd-7secrets-ebook/</loc><lastmod>2021-04-05T03:04:16+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/what-is-network-detective-pro/</loc><lastmod>2021-04-05T03:04:15+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/how-does-network-detective-pro-work/</loc><lastmod>2021-04-05T02:04:56+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/resources/making-the-case-for-vulnerability-scans/</loc><lastmod>2021-04-05T01:04:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/compliance-reporting/</loc><lastmod>2021-03-31T12:37:41+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/tips-to-avoid-hipaa-compliance-violations/</loc><lastmod>2021-03-27T18:13:37+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/clients-need-internal-vulnerability-scans/</loc><lastmod>2021-03-23T10:27:50+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/port-scanning/</loc><lastmod>2021-03-22T07:48:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/port-scanning/</loc><lastmod>2021-03-22T07:48:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/implement-nist-csf-for-hipaa-safe-harbor/</loc><lastmod>2021-03-10T09:45:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/closer-look-at-cmmc-interim-rule-plan-of-action-and-milestones/</loc><lastmod>2021-03-03T09:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/closer-look-at-cmmc-interim-rule-ssp-requirement/</loc><lastmod>2021-02-17T08:00:00+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-msps-need-to-know-about-cmmc-interim-rule-scoring/</loc><lastmod>2021-02-03T09:28:38+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/are-your-clients-still-running-windows-7/</loc><lastmod>2021-01-20T08:56:16+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/what-msps-need-to-know-about-cmmc/</loc><lastmod>2020-12-02T10:00:12+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/could-clients-commit-one-of-common-hipaa-violations/</loc><lastmod>2020-11-18T09:25:21+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/selling-security-and-compliance-services-to-financial-legal-and-cpa-markets/</loc><lastmod>2020-08-26T09:16:47+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/nist-csf-the-swiss-army-knife-of-cybersecurity/</loc><lastmod>2020-04-29T08:50:10+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/5-ways-cyber-liability-claims-get-denied/</loc><lastmod>2020-01-07T15:52:33+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/top-10-insider-cybersecurity-threats-and-how-to-handle-them/</loc><lastmod>2019-12-05T15:04:30+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/why-offer-cyber-risk-insurance-in-your-security-services/</loc><lastmod>2019-10-17T12:46:44+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/eight-ways-msps-can-prove-client-pci-compliance/</loc><lastmod>2019-05-23T11:03:50+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/blog/categories/pci-dss/</loc><lastmod>2019-05-23T11:03:50+00:00</lastmod></url><url><loc>https://www.rapidfiretools.com/products/grc-software/asd/</loc></url><url><loc>https://www.rapidfiretools.com/about-us/</loc></url><url><loc>https://www.rapidfiretools.com/products/network-assessment/</loc></url><url><loc>https://www.rapidfiretools.com/book-a-meeting/</loc></url><url><loc>https://www.rapidfiretools.com/resources/buyers-guides/</loc></url><url><loc>https://www.rapidfiretools.com/products/grc-software/demo/</loc></url><url><loc>https://www.rapidfiretools.com/product-tour/compliance-manager-grc/</loc></url><url><loc>https://www.rapidfiretools.com/contact-us/</loc></url><url><loc>https://www.rapidfiretools.com/products/it-change-detection/</loc></url><url><loc>https://www.rapidfiretools.com/products/it-change-detection/demo/</loc></url><url><loc>https://www.rapidfiretools.com/blog/categories/cybersecurity-maturity-model-certification-cmmc/</loc></url><url><loc>https://www.rapidfiretools.com/resources/e-guides/</loc></url><url><loc>https://www.rapidfiretools.com/events/</loc></url><url><loc>https://www.rapidfiretools.com/products/grc-software/</loc></url><url><loc>https://www.rapidfiretools.com/blog/categories/identity-access-management-iam/</loc></url><url><loc>https://www.rapidfiretools.com/report_types/infographics/</loc></url><url><loc>https://www.rapidfiretools.com/resources/infographics-checklists/</loc></url><url><loc>https://www.rapidfiretools.com/products/it-change-detection/alerting/</loc></url><url><loc>https://www.rapidfiretools.com/solutions/it-departments/</loc></url><url><loc>https://www.rapidfiretools.com/legal/products-terms-of-use/</loc></url><url><loc>https://www.rapidfiretools.com/legal/</loc></url><url><loc>https://www.rapidfiretools.com/solutions/msp/</loc></url><url><loc>https://www.rapidfiretools.com/products/network-assessment/demo/</loc></url><url><loc>https://www.rapidfiretools.com/products/network-assessment/reports/</loc></url><url><loc>https://www.rapidfiretools.com/products/network-assessment/upgrade/</loc></url><url><loc>https://www.rapidfiretools.com/product-tour/network-detective/</loc></url><url><loc>https://www.rapidfiretools.com/products/</loc></url><url><loc>https://www.rapidfiretools.com/product-tour/</loc></url><url><loc>https://www.rapidfiretools.com/blog/categories/remote-monitoring-and-management-rmm/</loc></url><url><loc>https://www.rapidfiretools.com/request/quote/</loc></url><url><loc>https://www.rapidfiretools.com/request/demo-experience/</loc></url><url><loc>https://www.rapidfiretools.com/request/demo/</loc></url><url><loc>https://www.rapidfiretools.com/blog/categories/sales-marketing/</loc></url><url><loc>https://www.rapidfiretools.com/testimonials/</loc></url><url><loc>https://www.rapidfiretools.com/products/vulnerability-management/</loc></url><url><loc>https://www.rapidfiretools.com/products/vulnerability-management/demo/</loc></url><url><loc>https://www.rapidfiretools.com/products/vulnerability-management/reports/</loc></url><url><loc>https://www.rapidfiretools.com/product-tour/vulscan/</loc></url><url><loc>https://www.rapidfiretools.com/products/whats-new/</loc></url></urlset>