<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ilogoindonesia.id/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ilogoindonesia.id/perusahaan-data-center-terbesar/</loc>
		<lastmod>2024-10-18T10:42:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/berkenalan-dengan-cloud-server-dari-huawei-cloud-manfaat-dan-cara-kerjanya/</loc>
		<lastmod>2024-10-18T10:45:06+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/04/Huawei-Cloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/kebocoran-data-250-juta-pemilih-di-jual-rp-1-2m-cegah-dengan-solusi-imperva/</loc>
		<lastmod>2024-10-18T10:48:18+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2023/12/kebocoran-data-pemilu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/bagaimana-zerofox-bisa-membuat-online-tetap-aman-dari-serangan-siber-eksternal/</loc>
		<lastmod>2024-10-18T10:48:23+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2023/11/zerofox.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/alasan-data-security-seharusnya-menjadi-prioritas-top-business/</loc>
		<lastmod>2024-10-18T10:48:28+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2023/10/dell-tech.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2023/10/3-elemen-penting-Dell-recovery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/mengapa-penetration-testing-penting-dalam-infrastruktur-it/</loc>
		<lastmod>2024-10-18T10:48:31+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2021/10/ImmuniWeb-qFirewall-Indonesia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/jaringan-berbasis-tujuan/</loc>
		<lastmod>2024-10-18T10:48:39+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/gambar1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/gambar2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/gambar3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/pencurian-identitas-cara-melindungi-identitas-akun-dan-uang-anda-selama-pandemi/</loc>
		<lastmod>2024-10-18T10:49:27+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/Identity-Fraud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/prism-ultimate/</loc>
		<lastmod>2024-10-18T10:49:32+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/AOS_admin.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://ilogoindonesia.id/wp-content/uploads/2020/11/gambar-2-SQL-Server-Visibility.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/gambar-3-Application-Discovery-in-Prism-Ultimate.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/data-loss-prevention/</loc>
		<lastmod>2024-10-18T10:49:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/ssd-tlc-vs-qlc-apa-perbedaannya/</loc>
		<lastmod>2024-10-18T10:49:42+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/TLC_VS_QLC.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/bagaimana-cara-menjaga-data-dari-bencana-alam/</loc>
		<lastmod>2024-10-18T10:49:46+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2020/11/melidungi_data_dari_bencana.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/solusi-threat-detection-and-response-sebuah-solusi-penting-namun-bukan-sebuah-solusi-keseluruhan/</loc>
		<lastmod>2024-10-18T10:49:56+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2023/10/Solusi-threat-detection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/manfaat-iot-untuk-dorong-akselerasi-bisnis/</loc>
		<lastmod>2024-10-18T10:50:02+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2023/10/Iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/cloud-computing-atau-on-premise-pilih-yang-mana/</loc>
		<lastmod>2024-10-18T10:50:09+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2022/01/on-prem@2x.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/stretegi-bisnis-retail-paling-efektif-di-tahun-politik-2024/</loc>
		<lastmod>2024-10-18T10:50:14+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/01/strategi-bisnis.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/third-party-risk-management-apakah-penting-untuk-bisnis/</loc>
		<lastmod>2024-11-05T07:55:51+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/07/Scorecard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/data-center-untuk-meningkatkan-skalabilititas-bisnis-di-indonesia/</loc>
		<lastmod>2024-11-05T07:57:46+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/05/ilogoindonesia1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/gpt-in-a-box-2-0-telah-hadir-dengan-empat-cara-untuk-memulai-dengan-genai/</loc>
		<lastmod>2024-11-05T08:25:06+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/11/ilogoindonesia7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/membangun-jaringan-kantor-cabang-yang-lebih-baik-dengan-5g/</loc>
		<lastmod>2024-12-16T08:34:22+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/12/1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/praktik-terbaik-keamanan-jaringan-untuk-liburan/</loc>
		<lastmod>2024-12-29T03:35:19+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/12/11.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/dalam-upaya-meraih-keunggulan-bagaimana-synology-melipat-gandakan-performa-hyper-backup/</loc>
		<lastmod>2024-12-29T03:40:57+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/12/22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/hpe-aruba-networking-memenangkan-penghargaan-produk-terbaik-crn-untuk-wi-fi-7-dan-sd-wan/</loc>
		<lastmod>2025-01-11T14:30:37+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/01/13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/wi-fi-7-masa-depan-jaringan-nirkabel-berkecepatan-tinggi-kini-telah-hadir/</loc>
		<lastmod>2025-01-19T10:14:34+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/01/55.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://arista.ilogoindonesia.id/wp-content/uploads/2024/08/arista4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/prediksi-cyber-security-di-2025-dan-dampaknya-pada-bisnis/</loc>
		<lastmod>2025-02-06T07:51:41+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/01/119588580_10222603-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/lihat-ancaman-yang-penting-dengan-logrhythm-intelligence-yang-didorong-oleh-ai/</loc>
		<lastmod>2025-02-06T09:08:59+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/02/13.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/apa-selanjutnya-untuk-keamanan-teknologi-operasional-ot/</loc>
		<lastmod>2025-02-15T13:54:04+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/02/22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/kebangkitan-deepseek-menunjukkan-keamanan-ai-terus-berubah/</loc>
		<lastmod>2025-02-20T07:31:30+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/02/15.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/memahami-siem-solusi-krusial-untuk-mengidentifikasi-dan-menanggapi-ancaman-siber/</loc>
		<lastmod>2025-02-28T10:11:03+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/02/11.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/kesalahan-umum-dalam-keamanan-data-center-dan-solusi-untuk-mencegahnya/</loc>
		<lastmod>2025-02-28T10:25:11+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/02/12.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/masa-depan-konektivitas-wi-fi-7-sebagai-jalur-cepat-menuju-internet-lebih-andal/</loc>
		<lastmod>2025-03-06T09:01:50+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/03/21.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/hindari-penipuan-begini-cara-mengenali-aplikasi-berbahaya-di-app-store/</loc>
		<lastmod>2025-03-18T00:02:22+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/03/Capture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/faktor-penyebab-kerusakan-baterai-ups-cara-mencegahnya/</loc>
		<lastmod>2025-03-21T04:09:48+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/03/12.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/hati-hati-terhadap-modus-penipuan-yang-menggunakan-nama-bank-dengan-mengirimkan-sms-berisi-otp-palsu/</loc>
		<lastmod>2025-03-28T09:39:26+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/03/24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/arsitektur-zero-trust-paradigma-keamanan-terkini-di-tahun-2025/</loc>
		<lastmod>2025-04-05T05:03:17+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/04/Capture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/jangan-sampai-tertipu-ini-cara-mengenali-aplikasi-berbahaya-di-app-store/</loc>
		<lastmod>2025-04-05T05:14:16+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/04/11.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/analisis-aktivitas-pelaku-ancaman/</loc>
		<lastmod>2025-04-14T07:19:26+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/04/13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/arsitektur-zero-trust-apakah-ini-menjadi-standar-keamanan-utama-di-tahun-2025/</loc>
		<lastmod>2025-04-14T07:45:48+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/04/14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/waspadai-bahaya-wifi-publik-begini-cara-mengamankan-perangkat-anda-dari-hacker/</loc>
		<lastmod>2025-04-27T15:29:37+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/04/17.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/risiko-data-bocor-karena-karyawan-gaptek-ini-solusinya/</loc>
		<lastmod>2025-05-14T04:22:23+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/05/11.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/fungsi-edr-dalam-mencegah-ancaman-siber/</loc>
		<lastmod>2025-05-14T04:38:39+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/05/Capture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/apa-yang-membuat-ransomware-menjadi-ancaman-serius-di-era-digital/</loc>
		<lastmod>2025-05-22T08:13:50+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/05/11.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/penetration-test-penjelasan-kegunaan-dan-klasifikasinya/</loc>
		<lastmod>2025-05-22T08:27:16+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/05/12.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/mengenal-das-nas-dan-san-pilihan-penyimpanan-mana-yang-paling-cocok/</loc>
		<lastmod>2025-05-22T08:41:13+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/05/13.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/bagaimana-edr-membantu-mencegah-serangan-siber/</loc>
		<lastmod>2025-05-22T08:53:10+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/05/Capture.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/on-premise-storage-investasi-bijak-atau-beban-bisnis/</loc>
		<lastmod>2025-06-10T02:53:38+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/06/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/waspadai-phishing-ini-cara-mengenali-tautan-berbahaya-di-browser/</loc>
		<lastmod>2025-06-10T03:02:51+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/06/12.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/alasan-setiap-bisnis-wajib-melakukan-pengujian-keamanan-sistem/</loc>
		<lastmod>2025-06-10T03:11:26+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/06/13.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/06/Picture1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/cyber-security-dalam-dunia-bisnis-kenapa-harus-diprioritaskan/</loc>
		<lastmod>2025-06-23T06:22:23+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/06/14.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/perkembangan-firewall-dari-tradisional-ke-next-generation/</loc>
		<lastmod>2025-06-23T06:48:07+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/06/Capture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/gunakan-acronis-edr-xdr-dan-mdr-untuk-menangkal-ancaman-siber-secara-proaktif/</loc>
		<lastmod>2025-07-08T08:35:07+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/07/Untitled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/paas-phishing-as-a-service-ancaman-siber-modern-dan-solusi-menangkalnya/</loc>
		<lastmod>2025-07-08T08:46:50+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/07/Untitled-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/peran-kunci-cio-dalam-meningkatkan-keamanan-siber-layanan-kesehatan/</loc>
		<lastmod>2025-07-23T04:48:30+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2024/12/22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/phishing-as-a-service-perkembangan-taktik-serangan-siber-dan-cara-efektif-menghadapinya/</loc>
		<lastmod>2025-08-08T09:41:56+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/111.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/ransomware-menyerang-backup-anda-ini-solusi-pemulihan-dan-strategi-perlindungannya/</loc>
		<lastmod>2025-08-08T09:46:24+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/111-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/security-operations-center-garda-terdepan-keamanan-siber-organisasi/</loc>
		<lastmod>2025-08-08T09:53:58+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/111-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/lebih-baik-pakai-cisco-atau-mikrotik/</loc>
		<lastmod>2025-08-18T06:38:02+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/kupas-tuntas-siem-soar-dan-xdr-dalam-meningkatkan-pertahanan-siber-modern/</loc>
		<lastmod>2025-08-18T06:46:46+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/111-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/mencegah-massive-data-leak-perlindungan-data-di-era-digital/</loc>
		<lastmod>2025-08-26T04:12:05+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/333.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/apa-kata-para-ahli-machine-learning-dalam-offensive-security/</loc>
		<lastmod>2025-08-26T04:27:18+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/333-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/taegis-mdr-xdr-kini-terintegrasi-dengan-active-threat-response-di-sophos-firewall/</loc>
		<lastmod>2025-08-26T04:31:55+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/08/777.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/sangfor-hci-solusi-infrastruktur-it-modern-yang-lebih-sederhana-dan-efisien/</loc>
		<lastmod>2025-09-07T15:59:32+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/09/1757260511_333.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/sangfor-network-secure-next-generation-firewall-ngfw/</loc>
		<lastmod>2025-09-07T16:10:42+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/09/1757261331_333.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/mengapa-pelatihan-security-awareness-penting-untuk-mencegah-kesalahan-manusia-di-perusahaan/</loc>
		<lastmod>2025-10-03T04:27:36+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/10/1759465092_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/langkah-efektif-pulihkan-backup-setelah-serangan-ransomware-dan-cara-mencegahnya/</loc>
		<lastmod>2025-10-03T04:27:52+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/10/1759465571_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/mendorong-kesadaran-dan-aksi-nyata-di-cybersecurity-awareness-month-2025/</loc>
		<lastmod>2025-10-14T08:40:13+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/10/1760431155_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/cybersecurity-awareness-month-2025-bangun-kebiasaan-aman-cegah-serangan-siber/</loc>
		<lastmod>2025-10-14T08:41:44+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/10/1760430525_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/perlunya-security-awareness-training-untuk-meminimalkan-ancaman-siber-di-tempat-kerja/</loc>
		<lastmod>2025-11-10T03:19:55+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/10/1761906168_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/ketika-backup-menjadi-target-ransomware-panduan-pemulihan-dan-strategi-keamanannya/</loc>
		<lastmod>2025-11-10T03:20:12+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/11/1762744031_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/privileged-access-management-pam-pengertian-dan-signifikansinya-dalam-menjaga-keamanan-siber/</loc>
		<lastmod>2025-11-10T03:20:26+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/11/1762744608_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/10-alat-terbaik-untuk-mendeteksi-deepfake-ai-di-tahun-2025/</loc>
		<lastmod>2025-12-02T09:12:01+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/12/1764666059_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/mengenal-cisco-silicon-one-dalam-konsep-unified-networking-untuk-ai/</loc>
		<lastmod>2025-12-02T09:13:04+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/12/1764666652_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/human-firewall-saat-karyawan-menjadi-kunci-utama-keamanan-perusahaan/</loc>
		<lastmod>2025-12-29T08:17:11+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/12/1766995177_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/pertumbuhan-ai-menyebabkan-harga-ram-pc-terus-meningkat/</loc>
		<lastmod>2025-12-29T08:17:26+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/12/1766995593_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/infostealers-risiko-tersembunyi-bagi-keamanan-identitas-digital/</loc>
		<lastmod>2025-12-29T08:17:40+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/12/1766995918_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/tren-inovasi-teknologi-dengan-dampak-besar-bagi-industri-di-tahun-2026/</loc>
		<lastmod>2025-12-29T08:18:16+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2025/12/1766996176_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/indonesia-jadi-salah-satu-sumber-terbesar-serangan-ddos-di-dunia-fakta-dan-solusi-mitigasi/</loc>
		<lastmod>2026-01-11T15:32:14+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/01/1768145001_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/strategi-teknologi-perusahaan-2026-infrastruktur-it-keamanan-siber-dan-kesiapan-transformasi-digital/</loc>
		<lastmod>2026-01-11T15:32:30+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/01/1768145442_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/tren-dan-strategi-backup-data-2026-untuk-perlindungan-data-bisnis/</loc>
		<lastmod>2026-01-28T05:26:16+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/01/1769577209_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/cisco-catalyst-center-solusi-terpadu-untuk-manajemen-jaringan-modern/</loc>
		<lastmod>2026-01-28T06:53:18+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/01/1769583168_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/solusi-terbaik-menghentikan-ancaman-ddos-di-era-2026/</loc>
		<lastmod>2026-02-12T05:20:32+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/02/1770872505_333.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/simulasi-phishing-strategi-cerdas-mencegah-serangan-siber-sejak-dini/</loc>
		<lastmod>2026-02-12T05:20:48+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/02/1770872948_333.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/cisco-8000-series-secure-routers-inovasi-baru-untuk-jaringan-yang-lebih-aman-dan-siap-masa-depan/</loc>
		<lastmod>2026-02-12T05:21:02+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/02/1770873437_333.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/edge-infrastructure-yang-disederhanakan-secara-radikal-dengan-cisco-ucs-x-series/</loc>
		<lastmod>2026-03-03T09:25:43+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/03/1772528922_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/langkah-praktis-meningkatkan-kesadaran-keamanan-siber-bagi-karyawan/</loc>
		<lastmod>2026-03-03T09:25:57+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/03/1772529826_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/5-ancaman-phishing-dan-social-engineering-yang-perlu-anda-kenali/</loc>
		<lastmod>2026-04-02T04:51:05+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/04/1775103921_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/lindungi-data-perusahaan-dengan-nas-solusi-cerdas-anti-ransomware/</loc>
		<lastmod>2026-04-02T04:51:51+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/04/1775104348_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/solusi-cisco-di-indonesia-untuk-mengatasi-ancaman-digital/</loc>
		<lastmod>2026-04-02T04:56:17+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/04/111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/cara-menentukan-pilihan-storage-nas-yang-tepat-untuk-kebutuhan-perusahaan-anda/</loc>
		<lastmod>2026-04-13T06:16:56+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/04/1776051918_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/apa-yang-dimaksud-dengan-managed-services-kenali-manfaatnya-bagi-bisnis-anda/</loc>
		<lastmod>2026-04-13T06:18:17+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/04/1776055992_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ilogoindonesia.id/peran-ai-observability-dalam-mengurangi-risiko-downtime-pada-sistem-anda/</loc>
		<lastmod>2026-04-13T06:18:37+00:00</lastmod>
		<image:image>
			<image:loc>http://ilogoindonesia.id/wp-content/uploads/2026/04/1776060784_111.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->