<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ica40.fileflex.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ica40.fileflex.com/blog/automatic-photosync-and-video-file-sync-better-way/</loc>
		<lastmod>2018-09-24T16:58:00+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2017/01/Photo-Sync-Android-med-quality.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/secure-file-sharing-software-the-better-way/</loc>
		<lastmod>2018-09-24T17:35:53+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/iStock_000044068884Small-550-px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/remote-multi-device-file-manager-app/</loc>
		<lastmod>2018-09-24T18:33:42+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/ROUTER-Smart-phone-in-hand-small-for-twitter.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/addressing-cloud-security-issues-the-better-way-part-2/</loc>
		<lastmod>2018-09-24T18:43:36+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/Cloud-Security-Issues-Feature-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/addressing-security-issues-in-cloud-computing-the-better-way-part-1/</loc>
		<lastmod>2018-09-24T18:47:24+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/Security-Issues-in-Cloud-Computing-Feature-Image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/addressing-cloud-computing-security-issues-and-challenges/</loc>
		<lastmod>2018-09-25T13:51:48+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/Addressing-Cloud-Computing-Security-Issues-and-Challenges-Blog-Pic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/remote-file-access-the-better-way/</loc>
		<lastmod>2018-09-25T15:22:44+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/Remote-File-Access-Blog-Cover-Photo-1024x696.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/secure-private-streaming-the-better-way/</loc>
		<lastmod>2018-09-25T15:36:15+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/Streaming-girls-1000px.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/nas-storage-virtualization/</loc>
		<lastmod>2018-09-25T15:47:28+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/Guy-with-white-tshirt-modified-1024x481.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/file-virtualization-post/</loc>
		<lastmod>2019-08-20T20:08:02+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/FileFlex-announcement-email-banner-1024x420.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/comment-proteger-vos-donnees-avec-zero-trust-data-access-ztda/</loc>
		<lastmod>2021-02-03T16:27:40+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/08/ZTDA-Chart-French-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/08/ZTDA-Chart-French-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/comment-mettre-en-place-le-teletravail-en-mode-zero-trust-securite-confiance-nulle-ou-confiance-zero-au-lieu-dun-vpn-traditionnel/</loc>
		<lastmod>2021-02-03T16:33:00+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/07/Zero-Trust-by-Design-French-small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/key-benefits-of-extending-office-365-with-fileflex-enterprise/</loc>
		<lastmod>2021-02-03T18:15:50+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/07/ff-data-access-env-square.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/the-cloud-act-and-the-importance-of-keeping-data-on-premises/</loc>
		<lastmod>2021-02-03T19:00:50+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2019/10/iStock-846400236.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/how-to-make-your-multi-cloud-and-infrastructure-as-a-service-environment-easier-for-your-users/</loc>
		<lastmod>2021-02-03T19:16:12+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2019/09/Multicloud-business_phone_app-cropped-for-web.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2019/09/multicloud-size-chart.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2019/09/Multicloud-adoption-stat-chart.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2019/09/Multicloud-call-out1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/how-the-decentralized-cloud-increases-worker-productivity/</loc>
		<lastmod>2021-02-03T19:19:33+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2019/06/iStock-656141730-small-for-web.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2019/06/Increase-in-telecommuting-infographic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2019/06/Harris-poll-infographic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/centralized-vs-decentralized-cloud-storage/</loc>
		<lastmod>2021-02-03T19:26:28+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2017/05/main-banner-different.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2019/06/Centralized-Cloud-Architecture.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2019/06/Decentralized-Cloud-Architecture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/data-sovereignty-preventing-possible-data-exfiltration-inherent-cloud-storage-solutions/</loc>
		<lastmod>2021-02-03T19:31:30+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2018/10/Picture3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/how-to-share-videos/</loc>
		<lastmod>2021-02-03T19:37:01+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2015/03/How-I-Shared-My-Big-780GB-Collection-of-Home-Videos-Feature-Image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/how-to-share-music/</loc>
		<lastmod>2021-02-03T19:42:14+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2016/11/iStock_000040176924Small.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2016/11/100GB-music-collection2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2016/11/how-to-share-100-GB-of-music.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/pourquoi-zero-trust-pourquoi-maintenant/</loc>
		<lastmod>2021-05-06T20:29:56+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/05/Why-zero-trust-french-blog-pic-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/05/French-quote-for-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/ztda-zero-trust-data-access/</loc>
		<lastmod>2021-05-25T17:09:48+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/03/ztda-blog-post-.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/03/quote-for-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/nist-guidelines-for-zero-trust-and-meeting-them-for-remote-data-access/</loc>
		<lastmod>2021-05-25T17:11:27+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/02/NIST-full-transparent.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/03/BrightTALK-Webinar-cover-for-NIST-webinar-640x360-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/how-to-protect-your-data-with-zero-trust-data-access-ztda/</loc>
		<lastmod>2021-05-26T19:07:27+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/07/Zero-Trust-Data-Access-title.jpg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/07/ZTDA-Chart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/07/BrightTALK-cover-Enable-Your-Remote-Workforce-with-Zero-Trust-Instead-of-VPN.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/why-zero-trust-and-why-now/</loc>
		<lastmod>2021-05-26T19:07:27+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/01/Zero-Trust-cover-for-Anthonys-blog-post.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/01/Principles-of-Zero-Trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/varonis-is-discontinuing-support-for-datanywhere-fileflex-enterprise-is-the-best-alternative/</loc>
		<lastmod>2021-05-26T19:08:22+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/varonis-hero-img-web-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/Picture1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/Picture4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/Picture3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/Picture5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/use-fileflex-enterprise-to-create-virtual-data-rooms/</loc>
		<lastmod>2021-05-26T19:08:22+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/horizontal-shot-of-pleasant-looking-successful-professional-female-picture-id1139704046-medium.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/Create-a-Virtual-Data-Room-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/sharing-a-virtual-data-room2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/sharing-a-virtual-data-room3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/sharing-a-virtual-data-room5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/sharing-a-virtual-data-room4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/Create-a-Virtual-Data-Room-Recipient-view.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/01/Create-a-Virtual-Data-Room-Pic-recipient-view-drag-and-drop.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/mitigate-spear-phishing-via-the-fileflex-enterprise-zero-trust-platform/</loc>
		<lastmod>2021-05-26T19:08:22+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/02/iStock-1150693468.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ica40.fileflex.com/wp-content/uploads/sites/71/2020/02/Anatomy-of-infiltration-and-attack-diagram.jpg.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/02/ECA-podinar2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/extending-office-365-functionality-into-a-hybrid-it-infrastructure/</loc>
		<lastmod>2021-05-26T19:08:22+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/07/ff-data-access-env-square.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/easy-remote-access-sharing-and-collaboration-of-sharepoint-document-libraries/</loc>
		<lastmod>2021-05-26T19:08:23+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/04/iPhone-6-Closeup-Hand-03-small-for-powerpoint-background.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/how-fileflex-enterprise-helps-dod-contractors-meet-cmmc-best-practices-for-access-control/</loc>
		<lastmod>2021-05-31T20:20:04+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/05/iStock-1158791540.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/enabling-your-remote-workforce-with-zero-trust-by-design-no-vpn/</loc>
		<lastmod>2021-05-31T20:27:15+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/05/Zero-trust-by-design.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/using-zero-trust-architecture-zta-to-protect-remote-data-access/</loc>
		<lastmod>2021-06-02T13:41:14+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/05/Zero-Trust-Architecture-ZTA-is-fast-becoming-the-security-model-of-choice-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/05/EXTEND_ZT_GRAPHIC2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/nist-sp-800-171v2-access-control-practices-for-remote-data-access/</loc>
		<lastmod>2021-07-19T19:53:08+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/07/iStock-502806184.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ica40.fileflex.com/blog/how-zero-trust-security-promises-to-cast-a-wide-net-on-spear-phishers/</loc>
		<lastmod>2021-08-13T14:16:42+00:00</lastmod>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2021/08/SpearPhishing_CoverImage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ica40.fileflex.com/wp-content/uploads/sites/71/2020/02/ECA-podinar2.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->