<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://nesecurity.com.br/</loc><lastmod>2026-04-12</lastmod><changefreq>weekly</changefreq><priority>1.0</priority></url>
  <url><loc>https://nesecurity.com.br/blog</loc><lastmod>2026-04-12</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url>
  <url><loc>https://nesecurity.com.br/demo-ai</loc><lastmod>2026-04-12</lastmod><changefreq>monthly</changefreq><priority>0.8</priority></url>
  <url><loc>https://nesecurity.com.br/produtos/vydar</loc><lastmod>2026-04-13</lastmod><changefreq>monthly</changefreq><priority>0.9</priority></url>
  <url><loc>https://nesecurity.com.br/sobre</loc><lastmod>2026-04-12</lastmod><changefreq>monthly</changefreq><priority>0.6</priority></url>
  <url><loc>https://nesecurity.com.br/blog/como-a-integracao-entre-n8n-e-nagios-pode-transformar-a-gestao-de-ti-da-sua-empresa</loc><lastmod>2026-01-20</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/soc-n1-automatizado-a-evolucao-do-security-operations-center-moderno</loc><lastmod>2025-12-31</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/por-que-os-hackers-agora-estao-mirando-vpns-e-roteadores</loc><lastmod>2025-11-18</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/vulnerabilidades-em-bibliotecas-de-consulta-afetam-aplicacoes-criticas</loc><lastmod>2025-10-29</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/seguranca-ot-com-codigo-aberto-como-reduzir-custos-sem-abrir-mao-da-protecao</loc><lastmod>2025-10-28</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/ganhos-concretos-da-integracao-entre-o-wazuh-e-sistemas-linux</loc><lastmod>2025-09-18</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/como-reduzir-o-mttr-de-incidentes-com-nagios-n8n-e-inteligencia-artificial</loc><lastmod>2025-08-28</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-xi-2024r2-o-que-ha-de-novo-e-por-que-isso-importa-para-o-seu-ambiente-de-monitoramento</loc><lastmod>2025-07-21</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/wazuh-misp-integracao-inteligente</loc><lastmod>2025-07-08</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/supply-chain-attack-expansion-proteja-sua-empresa-contra-ataques-na-cadeia-de-suprimentos</loc><lastmod>2025-04-14</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/ddos-uma-ameaca-cibernetica-critica-e-como-mitiga-la</loc><lastmod>2025-01-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/vulnerabilidade-de-software</loc><lastmod>2025-01-24</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/rca</loc><lastmod>2025-01-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/por-que-sua-empresa-deve-implementar-o-threat-hunting</loc><lastmod>2024-12-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/csirt-a-chave-para-respostas-rapidas-e-eficazes</loc><lastmod>2024-11-25</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/ne-e-soar-transformando-a-seguranca-com-automacao-e-integracao</loc><lastmod>2024-11-18</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/purple-team-red-e-blue-team-unidos-para-proteger-sua-empresa</loc><lastmod>2024-11-11</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/ne-e-fortigate-seguranca-e-performance</loc><lastmod>2024-10-22</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/adaptabilidade-em-ti-suporte-tecnico-com-parcerias-estrategicas</loc><lastmod>2024-10-04</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/ne-e-seguranca-de-endpoints-por-que-e-tao-importante</loc><lastmod>2024-09-20</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/como-a-ne-mantem-sua-nuvem-sempre-segura-e-em-conformidade</loc><lastmod>2024-09-09</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/fortaleca-sua-seguranca-cibernetica-com-o-wazuh-da-ne-uma-solucao-abrangente</loc><lastmod>2024-08-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/os-maiores-riscos-de-nao-implementar-um-controle-de-seguranca-efetivo-em-sua-empresa</loc><lastmod>2024-07-24</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/melhores-praticas-de-seguranca-em-ti-o-que-toda-empresa-precisa-saber</loc><lastmod>2024-07-10</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/vantagens-de-implementar-cnapp</loc><lastmod>2024-06-26</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/analise-de-causa-raiz-medida-essencial-para-fortalecer-sua-seguranca-cibernetica</loc><lastmod>2024-06-10</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/confiabilidade-de-dados-essencial-para-a-continuidade-dos-negocios</loc><lastmod>2024-05-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/transforme-dados-em-decisoes-o-papel-da-inteligencia-empresarial</loc><lastmod>2024-04-29</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/defenda-se-dicas-praticas-de-seguranca-cibernetica-para-empresas</loc><lastmod>2024-04-15</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/automatize-para-crescer-o-impacto-da-automacao-na-eficiencia-empresarial</loc><lastmod>2024-04-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/entenda-as-principais-vantagens-do-xcitium-eppedr</loc><lastmod>2024-03-30</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/seguranca-de-ti-vital-para-a-continuidade-dos-negocios</loc><lastmod>2024-03-19</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/monitoramento-de-ti-precisao-para-gerir-a-sua-empresa</loc><lastmod>2024-03-01</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/processo-seguranca-de-ti-bem-definido</loc><lastmod>2024-02-29</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/processos-na-gestao-de-dados-corporativos</loc><lastmod>2024-02-19</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/a-importancia-da-visibilidade-dos-dados-para-a-tomada-de-decisoes-empresariais</loc><lastmod>2024-02-03</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/noc-rede-sempre-ativa</loc><lastmod>2024-01-24</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/beneficios-fortigate</loc><lastmod>2024-01-08</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-seu-melhor-aliado</loc><lastmod>2023-12-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/gerenciamento-de-logs</loc><lastmod>2023-12-19</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/phishing-como-identificar-e-evitar-ameacas-virtuais</loc><lastmod>2023-12-14</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/os-efeitos-do-malware-em-empresas-e-como-se-proteger</loc><lastmod>2023-12-05</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/explorando-as-ultimas-tendencias-em-ciberseguranca</loc><lastmod>2023-12-01</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/maturidade-de-seguranca-de-ti</loc><lastmod>2023-11-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/pentest-seguranca-de-sua-pme</loc><lastmod>2023-09-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/entenda-como-o-finops-ajuda-a-otimizar-os-gastos-da-sua-empresa-2</loc><lastmod>2023-09-15</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/por-que-e-tao-importante-investir-na-gestao-de-vulnerabilidade-da-sua-empresa-2</loc><lastmod>2023-09-11</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/seguranca-da-rede-seu-escudo-contra-o-caos-cibernetico-2</loc><lastmod>2023-09-08</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/a-revolucao-do-wazuh-ne-brasil-oferece-solucao-disruptiva-para-a</loc><lastmod>2023-09-06</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/wazuh-4-4-a-arma-definitiva-contra-violacoes-ransomware-e-ataques</loc><lastmod>2023-09-06</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/alerta-vermelho-a-falta-de-monitoramento-continuo-coloca-a-seguranca-de-ti-em-risco-2</loc><lastmod>2023-09-04</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/perder-a-visibilidade-e-perder-o-jogo-domine-a-triade-do-soc-e-mantenha-os-invasores-a-distancia-2</loc><lastmod>2023-05-25</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/wazuh-4-4-a-arma-definitiva-contra-violacoes-ransomware-e-ataques-ciberneticos-2</loc><lastmod>2023-05-12</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/a-revolucao-do-wazuh-ne-brasil-oferece-solucao-disruptiva-para-a-seguranca-cibernetica-empresarial-2</loc><lastmod>2023-04-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/fortinet-wazuh-protecao-maxima-para-o-seu-negocio-2</loc><lastmod>2023-04-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/siem-como-se-proteger-no-cenario-atual-de-ameacas-2</loc><lastmod>2023-03-16</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/siem-e-xdr-seu-aliado-contra-ransomware-2</loc><lastmod>2023-03-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/siem-razoes-para-implementar-em-sua-empresa-e-garantir-mais-seguranca-2</loc><lastmod>2023-02-16</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/para-que-serve-siem-2</loc><lastmod>2023-02-09</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/seguranca-digital-para-empresas-qual-o-primeiro-passo-e-qual-plataforma-utilizar-2</loc><lastmod>2023-02-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-xi-o-que-e-e-por-que-aplicar-em-minha-empresa-2</loc><lastmod>2023-01-20</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/qual-a-diferenca-entre-soc-e-noc-2</loc><lastmod>2023-01-06</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/monitoramento-de-ti-descomplicado-com-o-nagios-xi-2</loc><lastmod>2022-12-19</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-passive-checks-o-que-e-e-qual-sua-real-funcionalidade-2</loc><lastmod>2022-12-01</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-api-aprenda-a-usar-2</loc><lastmod>2022-11-22</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/monitoramento-de-ti-no-varejo-saiba-a-importancia-e-como-garantir-sucesso-2</loc><lastmod>2022-11-17</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-como-fazer-consulta-json</loc><lastmod>2022-11-03</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/monitoramento-de-rede-protecao-contra-falhas-que-voce-nao-sabia-que-precisava</loc><lastmod>2022-10-20</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-e-a-solucao-para-empresas-do-ramo-financeiro-confira</loc><lastmod>2022-10-06</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-xi-monitorando-azure-cloud</loc><lastmod>2022-09-15</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/seguranca-de-dados-8-dicas-para-garantir-a-seguranca-do-seu-negocio</loc><lastmod>2022-09-01</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/sistema-e-operacao-fora-do-ar-descubra-o-primeiro-passo-para-solucionar</loc><lastmod>2022-08-17</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/servico-de-monitoramento-de-ti-como-pode-contribuir-com-a-industria-petroquimica</loc><lastmod>2022-08-03</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/monitoramento-inteligente-vantagens-estrategicas-que-somente-ele-oferece</loc><lastmod>2022-07-20</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/suporte-especializado-quais-sao-os-passos-para-implementar-em-minha-empresa</loc><lastmod>2022-07-06</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/fortigate-o-que-e-e-quais-sao-suas-funcionalidades</loc><lastmod>2022-06-23</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/o-que-monitorar-com-nagios-na-area-da-saude</loc><lastmod>2022-06-09</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/engenharia-social-como-o-monitoramento-24h-faz-diferenca-no-dia-a-dia-da-sua-empresa</loc><lastmod>2022-05-25</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/monitoramento-sob-medida-4-razoes-para-sua-empresa-investir-nesse-servico</loc><lastmod>2022-05-11</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/observabilidade-x-monitoramento-quais-as-diferencas</loc><lastmod>2022-04-27</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/dashboards-como-podem-otimizar-os-processos-da-sua-empresa</loc><lastmod>2022-04-07</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/solucoes-de-ti-customizadas-quais-as-vantagens-dessa-opcao</loc><lastmod>2022-02-23</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/monitoramento-de-ti-o-que-considerar-ao-contratar</loc><lastmod>2022-02-09</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/ataque-hacker-a-secretaria-do-tesouro-nacional</loc><lastmod>2021-08-17</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/como-configurar-seu-nagios-com-api</loc><lastmod>2021-08-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-xi-audit-log</loc><lastmod>2021-08-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/manual-de-uso-two-factor-autentication</loc><lastmod>2021-07-28</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-xi-guia-de-configuracao-nagvis</loc><lastmod>2021-07-26</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/quer-saber-como-configurar-dashboards-do-seu-nagiosxi</loc><lastmod>2021-07-23</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/como-proteger-seus-dados-dos-hackers</loc><lastmod>2021-07-02</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/tipos-de-phishing-mais-comum-ataque-via-whatsapp</loc><lastmod>2021-06-30</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/ataques-hackers-aumentam-440-na-pandemia</loc><lastmod>2021-06-25</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/nagios-xi-5-passos-para-projetar-o-sistema-de-monitoramento</loc><lastmod>2021-05-13</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/como-migrar-a-configuracao-do-fortigate-entre-modelos-diferentes</loc><lastmod>2021-05-12</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/como-configurar-o-raspberry-pi-como-um-terminal-kiosk</loc><lastmod>2021-05-12</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/blog/configurando-link-health-monitor-no-fortigate</loc><lastmod>2021-05-12</lastmod><priority>0.7</priority></url>
  <url><loc>https://nesecurity.com.br/politica-de-privacidade</loc><lastmod>2026-04-12</lastmod><changefreq>yearly</changefreq><priority>0.3</priority></url>
</urlset>