<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//s.gigaom.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-distributed-cloud-file-storage/</loc>
		<lastmod>2022-08-16T16:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/bed56e56-istock-1125066701-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-primary-storage/</loc>
		<lastmod>2022-08-16T16:13:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/ec1a8f44-istock-1133924836-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/enterprise-analytic-solutions-2021/</loc>
		<lastmod>2022-08-16T16:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/Image-of-data-center-against-idyllic-view-of-bright-sun-over-clouds-during-sunny-day.-Concept-of-big-data-1070855540_4862x3095-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-aiops-solutions/</loc>
		<lastmod>2022-08-16T16:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/2be46f8c-istock-1149225158-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-aiops-solutions/</loc>
		<lastmod>2022-08-16T16:18:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/2be46f8c-istock-1149225158-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-solution-profile-cohesity/</loc>
		<lastmod>2022-08-16T16:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/9a98a309-network-3396348_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-report-for-evaluating-service-mesh/</loc>
		<lastmod>2022-08-16T16:19:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/10/network-of-business-concept-picture-id916346734-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-a-service-mesh/</loc>
		<lastmod>2022-08-16T16:20:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/10/network-of-business-concept-picture-id916346734-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-information-and-event-management-siem-solutions/</loc>
		<lastmod>2022-08-16T16:21:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/03/Abstract-internet-security-682063952_2125x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar/</loc>
		<lastmod>2022-08-16T16:22:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/0a9deee1-istock-866994328-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-master-data-management/</loc>
		<lastmod>2022-08-16T16:22:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/4a516c00-social-networking-service-concept.-communication-network.-1210918328_3840x2160-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-warehouses/</loc>
		<lastmod>2022-08-16T16:23:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/12/Datrium-featured-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/enterprise-readiness-of-cloud-mlops/</loc>
		<lastmod>2022-08-16T16:24:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/07/e7db9521-system-2660914_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-a-distributed-denial-of-service-ddos-solution/</loc>
		<lastmod>2022-08-18T18:30:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/06/Futuristic-background-of-business-network-1048167302_2295x1311.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-disaster-recovery-as-a-service-draas/</loc>
		<lastmod>2022-08-18T18:33:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/Digital-signals-flying-over-highway.-Digital-transformation.-Internet-of-Things.-966899060_2304x1305.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-automl/</loc>
		<lastmod>2022-08-18T18:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/12/Concept-of-digital-diagramgraph-interfacesvirtual-screenconnections-icon-on-blurred-background.Coworking-team-meeting.-912617272_2198x1370.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/winning-at-sd-wan/</loc>
		<lastmod>2022-08-18T18:37:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/07/46dc4182-network-presenting-finger-suit-shirt-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/sql-transaction-processing-price-performance-testing-3/</loc>
		<lastmod>2022-08-18T18:38:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/09/iStock-911132418-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/platform-play/</loc>
		<lastmod>2022-08-18T18:38:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/Innovation-and-science-concept-1177116437_2239x1343.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-automl/</loc>
		<lastmod>2022-08-18T18:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/12/Concept-of-digital-diagramgraph-interfacesvirtual-screenconnections-icon-on-blurred-background.Coworking-team-meeting.-912617272_2198x1370.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ai-chipsets/</loc>
		<lastmod>2022-08-18T18:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/5f1f69bc-computer-chip-5936602_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-colocation-2/</loc>
		<lastmod>2022-08-18T18:41:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/c31f4807-network-4774766_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/solution-profile-vyos/</loc>
		<lastmod>2022-08-18T18:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/09/bigstock-Data-Analysis-Process-Concept-31955189.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cloud-data-security/</loc>
		<lastmod>2022-08-18T18:42:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/05/Cloud-computing-concept.-947075714_6720x3981-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/nasuni-real-world-use-cases-and-analysis/</loc>
		<lastmod>2022-08-18T18:43:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/05/742d2dbf-data-structure-and-information-tools-for-networking-business-1148438339_2349x1281.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/a-better-way/</loc>
		<lastmod>2022-08-18T18:43:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/07/low-poly-smart-city-3d-wire-mesh-intelligent-building-automation-vector-id1020698160.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/blue-chip-recruit/</loc>
		<lastmod>2022-08-18T18:44:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/07/Businessman-holding-abstract-brain-and-icon-digital-marketing-strategy-and-growth-investment-business-target-goal-media-and-technology.-1150209332_2450x1227.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/ai-driven-drug-safety/</loc>
		<lastmod>2022-08-19T16:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/07/bigstock-199147276-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-decentralized-storage/</loc>
		<lastmod>2022-08-19T16:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/07/97e3d2e4-eti.sign_.decentralized-cloud-storage-21.215_sonar-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-loss-prevention/</loc>
		<lastmod>2022-08-19T16:49:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/08/july8-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/native-devops/</loc>
		<lastmod>2022-08-19T16:51:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/Image-of-data-center-against-idyllic-view-of-bright-sun-over-clouds-during-sunny-day.-Concept-of-big-data-1070855540_4862x3095-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-kubernetes-data-storage/</loc>
		<lastmod>2022-08-19T16:52:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/06/b567845a-rad.sign_.k8s-storage-entp-21.034-3_radar-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-native-kubernetes-data-storage/</loc>
		<lastmod>2022-08-19T16:52:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/03/75CAx4EM.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-report-for-evaluating-secure-service-access/</loc>
		<lastmod>2022-08-19T16:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/iStock-899720520.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-privileged-access-management/</loc>
		<lastmod>2022-08-19T16:54:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/06/bcc7a325-rad.cook_.pam-radar2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-warehouses-2/</loc>
		<lastmod>2022-08-19T16:55:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/c31f4807-network-4774766_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-low-code-no-code-solutions/</loc>
		<lastmod>2022-08-19T16:55:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/06/c4da5237-imagelikeembed-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-loss-prevention-platforms/</loc>
		<lastmod>2022-08-19T16:56:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/03/TDFRY0MI.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-information-and-event-management-solutions-siem/</loc>
		<lastmod>2022-08-19T16:57:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/03/Abstract-internet-security-682063952_2125x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cloud-analytics-platform-total-cost-of-ownership/</loc>
		<lastmod>2022-08-19T16:59:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/1715ae7b-1171424840307579.qtxgaqmuxpzgwakorjqt_height640.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection-for-the-enterprise/</loc>
		<lastmod>2022-08-19T17:02:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/06/62377ae0-rad.sign_.hcdpentr.-radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-catalogs/</loc>
		<lastmod>2022-08-19T17:02:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/06/74dfb316-rad.brust_.datacatalogs-2-radar-update.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/the-cost-savings-of-replacing-kafka-with-pulsar/</loc>
		<lastmod>2022-08-19T17:03:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/06/239597ad-analytics-3088958-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection-for-small-and-medium-sized-businesses/</loc>
		<lastmod>2022-08-19T17:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/05/cf83403d-hcdpsmb-radar-w.dell_.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/closing-the-gap-between-low-code-and-testing/</loc>
		<lastmod>2022-08-19T17:06:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/06/manager-technician-industrial-engineer-working-and-control-robotics-picture-id1022887882-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-file-based-cloud-storage-2/</loc>
		<lastmod>2022-08-19T17:07:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/bed56e56-istock-1125066701-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-secure-service-access/</loc>
		<lastmod>2022-08-19T17:08:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/iStock-899720520.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-master-data-management/</loc>
		<lastmod>2022-08-19T17:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/4a516c00-social-networking-service-concept.-communication-network.-1210918328_3840x2160-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/the-abcs-of-ci-cd/</loc>
		<lastmod>2022-08-19T17:10:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/04/64d1390c-mobile-phone-1419275_1920-e1619018355996.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-gitops-platforms/</loc>
		<lastmod>2022-08-19T17:11:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/05/bigstock-Fintech-Icon-On-Abstract-Fina-226174948.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-vulnerability-management/</loc>
		<lastmod>2022-08-19T17:14:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/05/d16bdfb9-vulnerability-radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-low-code-no-code-solutions/</loc>
		<lastmod>2022-08-19T17:17:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/04/Blue-hexadecimal-digit-code-information-technology-concept-956504578_4096x2304-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/medical-automation-ai-for-the-or/</loc>
		<lastmod>2022-08-19T17:18:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/03/bigstock-138247775-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-privileged-access-management/</loc>
		<lastmod>2022-08-19T17:18:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/11/communication-network-concept-iot-picture-id1154268738-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-vendor-profile-vmware/</loc>
		<lastmod>2022-08-19T17:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/iStock-860024736-e1543363887695-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-vendor-profile-zebrium/</loc>
		<lastmod>2022-08-19T17:20:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/iStock-860024736-e1543363887695-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-object-storage-2/</loc>
		<lastmod>2022-08-19T18:40:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/04/aefcc38a-imagelikeembed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/delivering-on-the-promise-of-sase/</loc>
		<lastmod>2022-08-19T18:42:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/c31f4807-network-4774766_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-data-storage/</loc>
		<lastmod>2022-08-19T18:43:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/03/75CAx4EM.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/a-better-intranet/</loc>
		<lastmod>2022-08-19T18:44:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/08/Network-of-business-concept.-1127447341_2340x1287.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-performance-testing-tools/</loc>
		<lastmod>2022-08-19T18:45:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/04/92efcf97-image13.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/kasten-by-veeam/</loc>
		<lastmod>2022-08-19T18:45:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/08/bigstock-Isometric-Cloud-Computing-Conc-243793318-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/adventist-risk-management-data-protection-infrastructure/</loc>
		<lastmod>2022-08-19T18:48:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/05/bigstock-Fintech-Icon-On-Abstract-Fina-226174948.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-evaluating-machine-learning-operations-mlops/</loc>
		<lastmod>2022-08-19T18:49:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/04/9323f969-rad.brus_.mlops_radar-chart.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-vulnerability-management-tools/</loc>
		<lastmod>2022-08-19T18:49:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/04/Internet-of-things-wireless-sensor-network-612825560_3532x2826-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-platforms/</loc>
		<lastmod>2022-08-19T18:50:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/998ad64c-imagelikeembed.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/61fed899-edge-platforms_radar-figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cassandra-total-cost-of-ownership-study/</loc>
		<lastmod>2022-08-19T18:54:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/d1968dc1-computer-2930704_1280.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-performance-testing-tools/</loc>
		<lastmod>2022-08-19T18:56:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/df456cb7-provetas-118222_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-ai-inference-chipsets/</loc>
		<lastmod>2022-08-19T18:56:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/5f1f69bc-computer-chip-5936602_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-enterprise-object-storage-2/</loc>
		<lastmod>2022-08-19T18:57:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/6134f7aa-computer-2760136_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hybrid-cloud-data-protection-2/</loc>
		<lastmod>2022-08-19T18:57:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/9a98a309-network-3396348_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/designing-data/</loc>
		<lastmod>2022-08-19T18:58:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/35969ac5-monitor-1307227_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/work-from-home-security/</loc>
		<lastmod>2022-08-19T18:58:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/9e6ecfa6-abstract-internet-digital-technology-concept-server-rack-room-background.-1203686395_2194x1371.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/building-a-modern-data-management-strategy/</loc>
		<lastmod>2022-08-19T18:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/11/Host-data-and-technology-1073095620_1732x1735.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/leveraging-low-code/</loc>
		<lastmod>2022-08-19T18:59:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/09/bigstock-Data-Analysis-Process-Concept-31955189.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-platforms/</loc>
		<lastmod>2022-08-19T19:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/01/2018-01-30-10.11.23-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/real-world-citizen-development/</loc>
		<lastmod>2022-08-19T19:04:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2014/12/iStock_000031089384_Small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-observability/</loc>
		<lastmod>2022-08-19T19:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/02/40a7a237-rad.thur_.cloud-observability_radar_the-purim-update.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/manage-highly-demanding-storage-workloads-in-hybrid-cloud-scenarios-with-ic-manage-holodeck/</loc>
		<lastmod>2022-08-19T19:06:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/01/c803e17e-binary-2728121-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/microsoft-365-data-protection-analysis/</loc>
		<lastmod>2022-08-19T19:42:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2014/07/168799504.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-machine-learning-operations-mlops/</loc>
		<lastmod>2022-08-19T19:42:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/01/2018-01-30-10.11.23-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cloud-data-warehouse-performance-testing-cloudera/</loc>
		<lastmod>2022-08-19T19:44:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/02/e5b35005-icon-5646460-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems/</loc>
		<lastmod>2022-08-19T19:45:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/02/bfc2af45-network-os-grun_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/understanding-and-managing-data-protection-for-kubernetes-in-enterprise-environments/</loc>
		<lastmod>2022-08-19T19:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/09/bigstock-Corridor-Of-Server-Room-With-226174957.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hyperconvergence-infrastructure-in-the-enterprise/</loc>
		<lastmod>2022-08-19T19:58:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/01/63343d0b-rad.sign_.hci-enterprise_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-operating-systems/</loc>
		<lastmod>2022-08-19T19:59:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/09/bigstock-Data-Analysis-Process-Concept-31955189.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-observability/</loc>
		<lastmod>2022-08-19T19:59:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/01/37d4df0d-network-observability-1.18.21_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hyperconverged-infrastructure-small-to-medium-enterprises-and-edge/</loc>
		<lastmod>2022-08-19T20:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/01/a11bdd4a-rad.sign_.hci-20.066_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/analytics-in-the-cloud-minimize-pain-maximize-success/</loc>
		<lastmod>2022-08-19T20:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/iStock-1195482922.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/extra-credit/</loc>
		<lastmod>2022-08-19T20:08:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/04/bigstock-set-of-cubes-surrounded-with-l-47316058.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/chain-of-demand/</loc>
		<lastmod>2022-08-19T20:09:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/a16d584d-istock-1159801440-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/end-to-end-digital-document-transformation-field-test-report/</loc>
		<lastmod>2022-08-22T16:10:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/01/Isometric-959162414_2003x1502.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/12/35169321-n_fig1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-observability/</loc>
		<lastmod>2022-08-22T16:10:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/iStock-860024736-e1543363887695-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/12/2f7c229e-co2_fg1-triangle.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/12/192849c2-co_fg2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-alternatives-to-amazon-aws-s3/</loc>
		<lastmod>2022-08-22T16:11:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/12/940d8b2d-s3a_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-observability-solutions/</loc>
		<lastmod>2022-08-22T16:12:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/12/b6a6542e-machine-1776925_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-virtualization/</loc>
		<lastmod>2022-08-22T16:12:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/11/5e06b5ec-dv_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-as-a-service/</loc>
		<lastmod>2022-08-22T16:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/11/b5f217bc-naas-network-as-a-service-key-radar-11.20.20-_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-evaluating-devsecops-tools/</loc>
		<lastmod>2022-08-22T16:17:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/11/5551cc97-devsecops-key-radar-2020-collins_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-collaborative-whiteboards/</loc>
		<lastmod>2022-08-22T16:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/11/89923be6-wb_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/api-and-microservices-management-benchmark/</loc>
		<lastmod>2022-08-22T16:42:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/08/Modern-cityscape-and-communication-network-concept.-928819758_4095x2438-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-data-protection/</loc>
		<lastmod>2022-08-22T16:46:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/11/9929abad-k8s_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/radar-for-video-conferencing-platforms/</loc>
		<lastmod>2022-08-22T16:47:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/11/053365ea-vc_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/costs-and-benefits-of-net-application-migration-to-the-cloud/</loc>
		<lastmod>2022-08-22T16:47:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/Digital-Cloud-Storage-Cloud-Computing-1136861473_2194x1372.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-virtualization/</loc>
		<lastmod>2022-08-31T20:23:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/10/afea5ad2-psychology-4440675_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-as-a-service/</loc>
		<lastmod>2022-08-31T20:24:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/04/Internet-of-things-wireless-sensor-network-612825560_3532x2826-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/best-practices-in-moving-from-itops-to-aiops/</loc>
		<lastmod>2022-08-31T20:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/08/Social-Networks-and-interaction-concept-1139378569_2492x1208.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-devsecops-tools/</loc>
		<lastmod>2022-08-31T20:26:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/09/bigstock-Creative-Digital-Padlock-Backd-235024876.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/high-performance-cloud-data-warehouse-performance-testing/</loc>
		<lastmod>2022-08-31T20:27:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/10/def38c32-cloud-data-4053448-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cloud-data-pipeline-services-foundational-platforms-with-expandable-capabilities/</loc>
		<lastmod>2022-08-31T20:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/10/becdf4ea-pexels-francesco-ungaro-96381-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-video-conferencing-platforms/</loc>
		<lastmod>2022-08-31T20:33:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/86c5e12b-monitor-5570991_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/digital-risk-compliance-and-data-centricity/</loc>
		<lastmod>2022-08-31T20:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/319a3176-cyberspace-5409039_1920.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/10/5057283d-dr_c1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-data-protection/</loc>
		<lastmod>2022-08-31T20:35:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/08/bigstock-Isometric-Cloud-Computing-Conc-243793318-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/high-performance-application-security-testing/</loc>
		<lastmod>2022-08-31T20:50:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/d6c133d6-security-4038043_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/komprise-unstructured-data-management/</loc>
		<lastmod>2022-08-31T20:51:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/18e4b483-komprise-logo-2019-horizontal-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-scale-out-file-storage/</loc>
		<lastmod>2022-09-02T14:29:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/2b97bac4-image6-e1599168488396.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-sd-wan/</loc>
		<lastmod>2022-09-02T14:30:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/08/91743a74-image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-collaborative-whiteboards/</loc>
		<lastmod>2022-09-02T14:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/02/xQ9rL1KQ-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/costs-and-benefits-of-net-application-migration-to-the-cloud-old/</loc>
		<lastmod>2022-09-02T14:47:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/Digital-Cloud-Storage-Cloud-Computing-1136861473_2194x1372.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-database-platforms/</loc>
		<lastmod>2022-09-02T14:48:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/07/9da08d3c-image4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-phishing-prevention-and-detection/</loc>
		<lastmod>2022-09-02T14:49:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/08/1f06eb4c-image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/clearblade/</loc>
		<lastmod>2022-09-02T14:49:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/iStock-1134020821.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/datacore/</loc>
		<lastmod>2022-09-02T14:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/08/e29cfdee-datacore-sansymphony.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/data-storage-for-cloud-native-applications/</loc>
		<lastmod>2022-09-02T15:04:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/08/7d01ab26-earth-2254769_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-value-stream-management/</loc>
		<lastmod>2022-09-02T15:06:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2017/06/bigstock-Advance-Of-Data-Cloud-92595950-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-storage-for-kubernetes/</loc>
		<lastmod>2022-09-02T15:06:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/2d40ca62-image3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/driving-value-through-visibility/</loc>
		<lastmod>2022-09-02T15:07:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/11/Image-of-data-center-against-idyllic-view-of-bright-sun-over-clouds-during-sunny-day.-Concept-of-big-data-1070855540_4862x3095-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/filling-the-spaces-between-people/</loc>
		<lastmod>2022-09-02T15:08:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/07/d2d0d2e3-social-media-3846597.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-database-platforms/</loc>
		<lastmod>2022-09-02T15:08:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/10/Secure-Data-Network-Digital-Cloud-Computing-Cyber-Security-Concept.-Earth-Element-Furnished-by-Nasa-1157887211_2313x1301.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-general-purpose-storage-systems/</loc>
		<lastmod>2022-09-02T15:08:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/07/2a7a400f-bsgp_fg1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/data-pipeline-platform-comparison/</loc>
		<lastmod>2022-09-02T15:09:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/07/da8dac61-network-3396348_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-scale-out-file-storage/</loc>
		<lastmod>2022-09-02T15:11:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2014/11/data-visualization.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/rancher/</loc>
		<lastmod>2022-09-02T15:11:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/David-Linthicum-Illustration-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-colocation/</loc>
		<lastmod>2022-09-02T15:12:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/65b88af5-image2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/vapor-io/</loc>
		<lastmod>2022-09-02T15:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2017/03/ai_wide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-high-end-storage-systems/</loc>
		<lastmod>2022-09-02T15:13:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/c98b1536-high-end-storage-twitter-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unstructured-data-management/</loc>
		<lastmod>2022-09-02T17:04:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/73fa8932-image6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-software-defined-storage/</loc>
		<lastmod>2022-09-02T17:04:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/54311494-bss_fg1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/red-hat-openshift/</loc>
		<lastmod>2022-09-02T17:04:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/824f5f85-openshift.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/vmware-tanzu-portfolio/</loc>
		<lastmod>2022-09-02T17:05:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/f164b9af-vmware-tanzu-icon_enterprise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-enterprise-block-storage-2/</loc>
		<lastmod>2022-09-02T17:05:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/57da7829-archive-1850170-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-people-analytics-platforms/</loc>
		<lastmod>2022-09-02T17:06:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/5879dad6-unnamed-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-colocation/</loc>
		<lastmod>2022-09-02T17:07:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2017/03/ai_wide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/big-panda/</loc>
		<lastmod>2022-09-02T17:07:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2016/12/ai-woman-v2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/fortinet/</loc>
		<lastmod>2022-09-02T17:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/ec1a8f44-istock-1133924836-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/enterprise-analytic-solutions-2020/</loc>
		<lastmod>2022-09-02T17:09:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/06/daa974a5-compass-5137269_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/data-prep-the-cloud/</loc>
		<lastmod>2022-09-02T17:09:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/05/742d2dbf-data-structure-and-information-tools-for-networking-business-1148438339_2349x1281.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/hycu/</loc>
		<lastmod>2022-09-02T17:21:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/future-proofing-the-network/</loc>
		<lastmod>2022-09-02T17:22:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2017/05/bigstock-Linking-entities-Network-net-121888637-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-aiops/</loc>
		<lastmod>2022-09-02T17:23:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/05/82c82570-aiops_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-aiops/</loc>
		<lastmod>2022-09-02T17:23:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2016/12/ai-woman-v2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/data-governance/</loc>
		<lastmod>2022-09-02T17:46:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/05/2422e941-board-2440249_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/high-performance-api-management-testing/</loc>
		<lastmod>2022-09-02T17:47:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/05/47773d8a-image1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-people-analytics-platforms/</loc>
		<lastmod>2022-09-02T17:49:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/05/2e1d172c-business-4838852_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/workflow-management-bringing-order-from-chaos/</loc>
		<lastmod>2022-09-02T17:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2014/09/marketingstrategy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/152779e1-unito_sidebar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-leveraging-federated-kubernetes/</loc>
		<lastmod>2022-09-02T17:50:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/cdf8bcbe-federated-kub_fig-2-radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-evaluating-data-warehouse-platforms/</loc>
		<lastmod>2022-09-02T17:52:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/f54c4e96-data-warehouse_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hosted-kubernetes-solutions/</loc>
		<lastmod>2022-09-02T17:53:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/1728d9cf-hosted-kub_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-warehouses/</loc>
		<lastmod>2022-09-02T17:54:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/0a9deee1-istock-866994328-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-infrastructure/</loc>
		<lastmod>2022-09-02T17:54:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/10c3801f-edge_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/aryaka/</loc>
		<lastmod>2022-09-02T17:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/ec1a8f44-istock-1133924836-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/foghorn/</loc>
		<lastmod>2022-09-02T17:55:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/iStock-1134020821.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-unstructured-data-management/</loc>
		<lastmod>2022-09-02T17:56:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/a16d584d-istock-1159801440-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-sd-wan/</loc>
		<lastmod>2022-09-02T17:56:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/ec1a8f44-istock-1133924836-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-file-based-cloud-storage/</loc>
		<lastmod>2022-09-02T17:57:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/74d1f57b-radar-for-file-based-cloud-storage-2_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/area-1/</loc>
		<lastmod>2022-09-02T17:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/61200990-istock-1065824694-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-ci-cd/</loc>
		<lastmod>2022-09-02T17:58:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/d53d293c-radar-for-cicdv2_fig-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-file-based-cloud-storage/</loc>
		<lastmod>2022-09-02T17:58:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/bed56e56-istock-1125066701-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/elt-an-evolution-of-the-etl-paradigm-designed-for-the-cloud/</loc>
		<lastmod>2022-09-02T17:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/9a86c087-abstract-internet-digital-technology-concept-server-rack-room-background.-1203686395_2194x1371.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-leveraging-federated-kubernetes-open-and-closed/</loc>
		<lastmod>2022-09-02T18:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/David-Linthicum-Illustration-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-object-storage/</loc>
		<lastmod>2022-09-02T18:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/03/1386b34b-radar-for-enterprise-object-storage_radar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/storageos/</loc>
		<lastmod>2022-09-02T18:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-1187821796-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/portworx/</loc>
		<lastmod>2022-09-02T18:52:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-1187821796-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cicd-jfrog/</loc>
		<lastmod>2022-09-02T18:53:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/A-male-hand-with-an-update-cogwheel-inside-a-digital-sphere.-1137632555_2125x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-phishing-protection-platforms/</loc>
		<lastmod>2022-09-02T18:53:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/61200990-istock-1065824694-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/the-foundation-of-your-ai-ml-infrastructure/</loc>
		<lastmod>2022-09-02T18:54:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/ba31c88b-modern-web-network-and-internet-telecommunication-technology-big-data-storage-cloud-computing-computer-service-business-concept-1035756522_3864x2548-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-work-management-automation/</loc>
		<lastmod>2022-09-02T18:54:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/2be46f8c-istock-1149225158-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/hcdp-druva/</loc>
		<lastmod>2022-09-02T19:00:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hosted-kubernetes-solutions/</loc>
		<lastmod>2022-09-02T19:01:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/90b9ec6f-istock-1153461651.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/acronis/</loc>
		<lastmod>2022-09-02T19:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/zerto/</loc>
		<lastmod>2022-09-02T19:02:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cohesity/</loc>
		<lastmod>2022-09-02T19:03:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/commvault/</loc>
		<lastmod>2022-09-02T19:03:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/veeam/</loc>
		<lastmod>2022-09-02T19:04:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/zimperium/</loc>
		<lastmod>2022-09-02T19:04:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/2dfe9ea3-istock-1065824694-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/sql-transaction-processing-price-performance-testing-azure-eas-vs-aws-r5a/</loc>
		<lastmod>2022-09-02T19:05:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/thing.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/empowering-users-to-mine-the-data-lake-energize-a-data-catalog-and-return-big-roi/</loc>
		<lastmod>2022-09-02T19:06:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/iStock-1150203443-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cicd-xebialabs/</loc>
		<lastmod>2022-09-02T19:06:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/A-male-hand-with-an-update-cogwheel-inside-a-digital-sphere.-1137632555_2125x1416.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2020/02/image2-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection/</loc>
		<lastmod>2022-09-02T19:07:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/ea4a4984-evaluating-hybrid-cloud-data-protection-roundup1_figure-1-gigaom-radar-for-hybrid-cloud-data-protection-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-infrastructure/</loc>
		<lastmod>2022-09-02T19:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/02/iStock-1134020821.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cicd-circlecl/</loc>
		<lastmod>2022-09-02T19:08:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/A-male-hand-with-an-update-cogwheel-inside-a-digital-sphere.-1137632555_2125x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cicd-micro-focus/</loc>
		<lastmod>2022-09-02T19:09:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/A-male-hand-with-an-update-cogwheel-inside-a-digital-sphere.-1137632555_2125x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cicd-aws/</loc>
		<lastmod>2022-09-02T19:10:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/A-male-hand-with-an-update-cogwheel-inside-a-digital-sphere.-1137632555_2125x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-pipeline-platforms/</loc>
		<lastmod>2022-09-02T19:10:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/iStock-93260456-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/proactive-services-data-management-in-the-age-of-hyper-distribution/</loc>
		<lastmod>2022-09-02T19:11:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/business-people-holding-tablet-and-statics-graph-chart-growing-in-picture-id1051632484.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2020/01/Scaylr_Figure-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/artificial-intelligence-where-you-need-it/</loc>
		<lastmod>2022-09-02T19:11:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/pic.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/deepdive/deep-dive-into-ai-issue-2/</loc>
		<lastmod>2022-09-02T19:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/DD-Cover-i2_coverA-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2020/01/year-artificial-intelligence-or-ai-futuristic-concept-silhouette-man-picture-id1156165793.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/ira-cohen.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/ron-green-headshot.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/karachalios-konstantinos-e1579717250557.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/robin-hanson.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/nova-spivack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/steve-pratt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/lorien-pratt.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/manoj-saxena.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/delivering-on-the-vision-of-mlops/</loc>
		<lastmod>2022-09-02T19:13:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/11/iStock-913588226-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2020/01/image3-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-report-enterprise-ci-cd/</loc>
		<lastmod>2022-09-02T19:14:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/A-male-hand-with-an-update-cogwheel-inside-a-digital-sphere.-1137632555_2125x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-catalogs/</loc>
		<lastmod>2022-09-07T15:28:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-122143781.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hybrid-cloud-data-protection/</loc>
		<lastmod>2022-09-07T15:29:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/iStock-982212676.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/taking-network-strategy-to-the-edge/</loc>
		<lastmod>2022-09-07T15:30:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/12/Digital-Cloud-Storage-Cloud-Computing-1136861473_2194x1372.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-file-based-primary-storage-ransomware-protection/</loc>
		<lastmod>2022-09-07T15:49:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/9bd53447-son.mort_.ransomware-file-22.344_sonar-reboot-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-block-based-primary-storage-ransomware-protection/</loc>
		<lastmod>2022-09-07T15:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/ecf1d7b9-son.mort_.ransomware-block-22.34-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-decentralized-storage/</loc>
		<lastmod>2022-09-12T15:55:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/7c6c01f3-son.mort_.decentralized-peer-to-peer-storage-22.346_sonar-chart_22.07.30-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/09/dc9f19c2-fig-1_son.mort_.decentralized-peer-to-peer-storage-22.346_sonar-draft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-robotic-process-automation-rpa-tools/</loc>
		<lastmod>2022-09-26T16:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/04/1715ae7b-1171424840307579.qtxgaqmuxpzgwakorjqt_height640.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-performance-benchmark-for-intelligent-document-processing-idp-solutions/</loc>
		<lastmod>2022-09-29T21:57:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/491d9d7d-bench-cloud-infra-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/confluent-cloud-fully-managed-kafka-streaming/</loc>
		<lastmod>2022-09-29T21:57:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/491d9d7d-bench-cloud-infra-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/transactional-and-analytical-workloads/</loc>
		<lastmod>2022-09-29T22:30:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/58ec1a10-bench-data-ana-ai.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/9307643b-analytics-transactional_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/everbridge-xmatters-on-call-alert-and-incident-response/</loc>
		<lastmod>2022-09-29T22:32:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/bb7a990f-bench-devops.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/4a08af28-xmatters-factoids-05.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/44577d0a-xmatters-perftesting-1_fig-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/api-and-microservices-management-benchmark-2/</loc>
		<lastmod>2022-09-29T22:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/491d9d7d-bench-cloud-infra-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/high-performance-api-management-testing-2/</loc>
		<lastmod>2022-09-29T22:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/12/Handsome-man-is-working-in-data-centre-with-laptop.-879720464_2122x1416.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/competitive-voice-services-reliability-benchmark/</loc>
		<lastmod>2022-09-30T14:35:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/491d9d7d-bench-cloud-infra-mgmt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/09/df0092f3-graphic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/sql-transaction-processing-and-analytic-performance-price-performance-testing/</loc>
		<lastmod>2022-09-30T14:36:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/58ec1a10-bench-data-ana-ai.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/costs-and-benefits-of-net-application-migration-to-the-cloud-2/</loc>
		<lastmod>2022-09-30T14:36:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/bb7a990f-bench-devops.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/fd0a3f45-ben.leva_.microsoft-web-app-paas-.net-tco-renewal-21.418_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/enterprise-readiness-of-cloud-mlops-a-gigaom-benchmark-report/</loc>
		<lastmod>2022-10-06T16:42:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/58ec1a10-bench-data-ana-ai.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/high-performance-web-application-firewall-testing/</loc>
		<lastmod>2022-10-13T19:21:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/3f61edc8-finalbenchmarks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/google-anthos-bare-metal-vs-do-it-yourself-deployments/</loc>
		<lastmod>2022-10-25T00:02:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/491d9d7d-bench-cloud-infra-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/netapp-cloud-volumes-ontap-a-gigaom-benchmark-field-test/</loc>
		<lastmod>2022-11-01T15:37:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/4b66b833-finalbenchmarks-30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-service-mesh/</loc>
		<lastmod>2022-11-01T20:23:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/d9dd0711-radarauthor-service-mesh.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/09/d5a7ca88-figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/log-data-analytics-testing/</loc>
		<lastmod>2022-11-02T18:05:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/58ec1a10-bench-data-ana-ai.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-information-and-event-management/</loc>
		<lastmod>2022-11-03T14:14:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/3583f1e4-radar-security-info-and-event-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-business-intelligence/</loc>
		<lastmod>2022-11-03T14:17:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/af045ccf-radar-enterprise-business-intelligence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-self-service-business-intelligence/</loc>
		<lastmod>2022-11-03T14:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/2d58c646-radar-self-service-business-intel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-orchestration-automation-and-response/</loc>
		<lastmod>2022-11-03T14:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/2d356336-radar-security-orchestration-automation-and-response.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-patch-management-solutions/</loc>
		<lastmod>2022-11-03T16:26:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/7bf0099d-radar-patch-management-updated-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-automated-security-operations-management/</loc>
		<lastmod>2022-11-03T16:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/33b89328-radar-header-for-automated-security-ops-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ddi/</loc>
		<lastmod>2022-11-03T17:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/a8ecac2b-radar-ddi-ddi-v3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/09/b55496c3-figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-digital-experience-platforms/</loc>
		<lastmod>2022-11-04T16:42:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/94b7c8bb-rad.clar_.dxp_22.469.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-endpoint-detection-and-response/</loc>
		<lastmod>2022-11-07T20:32:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/b23134a2-radar-tile-endpoint-detection-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-feature-flags/</loc>
		<lastmod>2022-11-07T20:37:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/94f40ad1-radar-tile-feature-flags-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-evaluating-network-as-a-service/</loc>
		<lastmod>2022-11-07T20:42:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/717a12c2-radar-tile-network-as-a-service-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-e-discovery/</loc>
		<lastmod>2022-11-07T20:45:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/18c5e590-radar-tile-e-discovery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-intelligent-document-processing/</loc>
		<lastmod>2022-11-07T20:53:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/28be5fb7-radar-tile-intelligent-document.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-observability-solutions/</loc>
		<lastmod>2022-11-07T20:56:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/e125dc1a-radar-tile-cloud-observability-v3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/362d4b13-rad.will_.cloud-observability-21.017_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-netdevops-2/</loc>
		<lastmod>2022-11-08T13:01:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/34d061b6-radar-tile-netdevops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ddos-protection-2/</loc>
		<lastmod>2022-11-08T13:25:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/aaa3396f-radar-tile-ddos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-api-security/</loc>
		<lastmod>2022-11-08T13:29:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/396d434a-radar-tile-app-api.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-penetration-testing-as-a-service/</loc>
		<lastmod>2022-11-08T21:27:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/124e48da-rad.ray_.pen-testing-22.426-2_radar-chart_v21.12.02-_itsm-copy-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-multifactor-authentication/</loc>
		<lastmod>2022-11-11T21:09:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/b2b6921f-radar-tile-multifactor-auth.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-security-posture-management/</loc>
		<lastmod>2022-11-11T21:11:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/0f8bb6b5-radar-tile-cloud-security-posture-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-container-security/</loc>
		<lastmod>2022-11-12T00:41:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/ac5f6c45-radar-container-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-native-kubernetes-data-storage-2/</loc>
		<lastmod>2022-11-14T20:08:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/3df7ceee-radar-tile_cloud-native-kubernetes-dta-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-kubernetes-data-storage-2/</loc>
		<lastmod>2022-11-14T20:11:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/01f5fa81-radar-tile_enterprise-kubernetes-dta-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-privileged-access-management-2/</loc>
		<lastmod>2022-11-14T20:13:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/05b5c02d-radar-tiles-_privileged-access-management-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-comprehensive-anti-phishing-solutions/</loc>
		<lastmod>2022-11-14T20:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/e7d14229-radar-tile_anti-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-loss-prevention-2/</loc>
		<lastmod>2022-11-14T20:22:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/d9de45cb-radar-tiles-_data-loss-prevention.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-continuous-vulnerability-management/</loc>
		<lastmod>2022-11-14T20:24:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/69365ebd-radar-tile_vulnerability-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-platforms-2/</loc>
		<lastmod>2022-11-15T17:44:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/74cb3832-radar-tile_edge-platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-policy-as-code/</loc>
		<lastmod>2022-11-15T17:50:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/7197fa18-radar-tile_policy-as-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection-small-and-medium-sized-businesses/</loc>
		<lastmod>2022-11-16T16:22:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/c287d9e4-radar-tile_hcdp-smb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-evaluating-financial-operations-finops-tools/</loc>
		<lastmod>2022-11-16T16:24:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/e3a32d46-radar-tile_financial-operations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-secure-service-access/</loc>
		<lastmod>2022-11-16T16:26:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/affb44e8-radar-tile_secure-service-access.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unified-communications-as-a-service-ucaas/</loc>
		<lastmod>2022-11-16T16:31:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/41810f75-radar-tile_ucaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-distributed-cloud-file-storage-2/</loc>
		<lastmod>2022-11-16T17:54:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/160a98ce-radar-tile-distributed-cloud-file-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-migration-tools/</loc>
		<lastmod>2022-11-16T17:54:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/ec7951cc-radar-tile-data-migration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/driving-better-outcomes-with-apm-and-observability/</loc>
		<lastmod>2022-11-16T19:22:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/10/26efb30a-web-4861612-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-observability-2/</loc>
		<lastmod>2022-11-17T18:22:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/6a830630-radar-tile_network-observability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-threat-intelligence-solutions/</loc>
		<lastmod>2022-11-17T18:27:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/75649f9f-radar-tile_threat-intelligence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-private-lte-and-5g-solutions/</loc>
		<lastmod>2022-11-17T18:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/d9794f5a-radar-tile_private-lte-5g.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-performance-testing-tools/</loc>
		<lastmod>2022-11-17T18:30:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/0ecee646-radar-tile_cloud-performance-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-aiops-solutions-2/</loc>
		<lastmod>2022-11-17T18:32:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/90104058-radar-tile_aiops-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-file-systems-2/</loc>
		<lastmod>2022-12-05T14:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/21c0112b-radar-tile-cloud-file-systems-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-identity-as-a-service/</loc>
		<lastmod>2022-11-18T23:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/71c25b90-radar-tile_id-as-a-service-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-value-stream-management-2/</loc>
		<lastmod>2022-11-18T23:15:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/1b8f2814-radar-tile_value-stream-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-agile-planning-and-portfolio-management-tools/</loc>
		<lastmod>2022-11-18T23:18:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/1a3fcc3e-radar-tile_agile-planning-port-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-process-and-task-mining-solutions/</loc>
		<lastmod>2022-11-18T23:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/d78f53f9-radar-tile_process-and-task-mining.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/05/4fa50369-key.shar_.process-and-task-mining_22.031-1_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-wi-fi-6-6e-solutions/</loc>
		<lastmod>2022-11-18T23:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/3facdbee-radar-tile_wi-fi-6-6e.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-network-service-providers/</loc>
		<lastmod>2022-11-18T23:33:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/0e66195f-radar-tile_network-operating-systems-network-service-providers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/05/55fa81e2-figure-1.-rad.grun_.nos-nsp_v2-21.040-2_radar-draf_table-1-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-large-enterprises-and-smbs/</loc>
		<lastmod>2022-11-18T23:36:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/e2c59793-radar-tile_network-operating-systems-enterprise-smb.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/05/ecbaca6f-figure-1-enterprise-rad.grun_.nos-enterprise_v2-21.040-4_figure-1-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-resource-management-solutions/</loc>
		<lastmod>2022-11-19T00:05:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/67410f14-radar-tile_kubernetes-resource-management-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-zero-trust-network-access-ztna/</loc>
		<lastmod>2022-11-19T00:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/b50e9ee3-radar-tile_zero-trust-network-access.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-extended-detection-and-response-xdr-solutions/</loc>
		<lastmod>2022-11-19T00:10:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/eaa89022-radar-tile_extended-detection-and-response-xdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-human-capital-management-hcm/</loc>
		<lastmod>2022-11-19T00:23:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/d3d5fee8-radar-tile_human-capital-management-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-virtual-desktop-infrastructure-desktop-as-a-service/</loc>
		<lastmod>2022-11-19T00:26:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/a4e01d09-radar-tile2_virtual-desktop-intra-desktop-as-a-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-incident-and-task-management-solutions/</loc>
		<lastmod>2022-11-19T00:29:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/603e2bee-radar-tile2_incident-and-task-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-platforms-for-hybrid-integration-and-automation/</loc>
		<lastmod>2022-11-19T00:31:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/c5d33c6e-radar-tile2_cloud-platforms-for-hybrid-integration-and-automation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/04/d8ebe7d7-res.kcr_.shar_.cloud-basedhips22.004-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cloud-parallel-file-systems/</loc>
		<lastmod>2022-11-21T20:41:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/ef0046d6-finalbenchmarks-28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-validation/</loc>
		<lastmod>2022-11-22T21:25:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/3a80fc28-radar-tile-network-validtion.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-api-management/</loc>
		<lastmod>2022-11-29T14:34:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/4b13c435-radar-tile_api-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-resource-optimization/</loc>
		<lastmod>2022-11-29T14:41:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/6f891e2a-radar-tile_cloud-resource-optimization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-and-api-protection/</loc>
		<lastmod>2022-11-29T14:49:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/21c17382-radar-tile_application-and-api-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-virtual-desktop-infrastructure-self-managed/</loc>
		<lastmod>2022-11-29T14:51:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/b866f9ea-radar-tile_virtual-desktop-intra-self-managed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-evaluating-managed-kubernetes-solutions/</loc>
		<lastmod>2022-11-29T14:59:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/7de1b1e8-radar-tile2-3ai_managed-kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-networking/</loc>
		<lastmod>2022-11-29T15:02:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/4d7c1a95-radar-tile2-cloud-networking-v4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-alternatives-to-amazon-s3/</loc>
		<lastmod>2022-11-29T15:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/e1931dc5-radar-tile-3_storage-alternates-to-s3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-attack-surface-management/</loc>
		<lastmod>2022-11-29T15:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/e8d99f56-radar-tile-3_attack-surface-managment-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-mobile-edge-solutions/</loc>
		<lastmod>2022-11-29T15:23:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/3f2a0df3-radar-tile-3_mobile-edge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-data-protection-2/</loc>
		<lastmod>2022-11-29T15:27:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/b4361c0c-radar-tile-3_kubernetes-data-protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2021/12/411e4b64-rad.sign_.data-protection-for-kubernetes-21.033_radar-draft_fig-10-copy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-performance-monitoring-apm/</loc>
		<lastmod>2022-11-29T15:31:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/62c0c783-radar-tile_application-performance-monitoring-apm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-global-lpwan-network-providers/</loc>
		<lastmod>2022-11-29T15:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/01/cae5d24e-radar-tile2_lpwan-v3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-storage-as-a-service/</loc>
		<lastmod>2022-11-29T23:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/2be99f3f-sonar-tile-storage-as-a-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-intelligent-virtual-assistants/</loc>
		<lastmod>2022-12-02T23:02:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/32904451-radar-tile-intelligent-virtual-assistants.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-center-switching/</loc>
		<lastmod>2022-12-02T23:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/5a5699ef-radar-tile-data-center-switching-v3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-machine-learning-operations/</loc>
		<lastmod>2022-12-05T20:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/0ddb10f0-radar-tile2-mlops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/abac-vs-rbac-the-advantage-of-attribute-based-access-control-over-role-based-access-control/</loc>
		<lastmod>2022-12-08T01:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/b03abeaf-finalbenchmarks-18.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-disaster-recovery-and-business-continuity-as-a-service/</loc>
		<lastmod>2022-12-09T19:33:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/606c23ff-radar-tile-4-dr-bc-aas-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-catalogs-2/</loc>
		<lastmod>2022-12-09T22:15:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/cc4884a1-radar-tile-4-data-catalogs-combined.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/dealing-with-data-system-complexity-in-your-applications/</loc>
		<lastmod>2022-12-13T20:40:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/06/manager-technician-industrial-engineer-working-and-control-robotics-picture-id1022887882-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-scale-out-file-storage-solutions/</loc>
		<lastmod>2022-12-13T23:38:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/0c99b6c2-kctile5-purple-cim.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-high-performance-scale-out-file-systems-2/</loc>
		<lastmod>2022-12-14T02:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/b45a8176-radar-tile-purple-dim_high-performance-scale-out-file-systems.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-scale-out-file-systems-2/</loc>
		<lastmod>2022-12-15T16:29:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/115bdb20-radar-tile-purple-dim_enterprise-scale-out-file-systems.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-and-operational-databases-nosql/</loc>
		<lastmod>2022-12-15T16:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/c406f648-radar-tile-4_cloud-operational-databases-nosql.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-and-operational-databases-relational/</loc>
		<lastmod>2022-12-15T16:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/7e8a6385-radar-tile-4_cloud-operational-databases-relational.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-warehouses-2/</loc>
		<lastmod>2022-12-16T22:29:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/d85692a1-radar-tile-4_data-warehouses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/choosing-the-right-solution-for-cloud-firewall/</loc>
		<lastmod>2022-12-16T22:32:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/63d788fe-finalbenchmarks-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-and-operational-database-solutions/</loc>
		<lastmod>2022-12-19T20:24:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/b97136e2-kctile3-pink-daa_cloud-operational-database.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-warehouse-solutions/</loc>
		<lastmod>2022-12-19T20:41:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/d712b7d2-kctile3-pink-daa-data-warehouse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hyperconverged-infrastructure-edge-deployments/</loc>
		<lastmod>2022-12-21T16:21:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/8b2b66fd-radar-tile-4_hci-edge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hyperconverged-infrastructure-enterprise-deployments/</loc>
		<lastmod>2022-12-21T17:15:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/c1f9b2c4-radar-tile-4_hci-enterprise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/advantages-of-datastax-astra-streaming-for-jms-applications/</loc>
		<lastmod>2022-12-22T20:19:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/928e86fa-finalbenchmarks-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-user-and-entity-behavior-analytics-solutions/</loc>
		<lastmod>2022-12-23T17:29:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/868686a6-kccovers-orange-security-eval-user.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-regulated-software-lifecycle-management-solutions/</loc>
		<lastmod>2022-12-23T18:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/a271383b-kctile1-periwinkle-ppa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-development-security-solutions/</loc>
		<lastmod>2022-12-23T20:33:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/a9219f3b-kccovers-orange-security-4_devsec2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-software-defined-wide-area-network-solutions/</loc>
		<lastmod>2022-12-23T20:40:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/7d86d7d4-kctile1-yellow-network-edge.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/12/29e156ac-key.mcph_.sd-wan_v3-22.548-2_kc_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-managed-security-services/</loc>
		<lastmod>2022-12-23T21:14:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/5642d564-kccovers-orange-security_managed-sec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-quality-platforms-detection-of-data-quality-issues/</loc>
		<lastmod>2022-12-28T18:04:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/b920d821-radar-tiles-esin-andrew_data-quality-detect.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-science-platforms-cloud-providers-data-platform-vendors-and-enterprise-incumbents/</loc>
		<lastmod>2022-12-28T18:09:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/d940c887-radar-tiles-esin-andrew_data-science-cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-quality-platforms-data-quality-remediation/</loc>
		<lastmod>2022-12-28T18:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/9b68e6a3-radar-tiles-esin-andrew_data-quality-remed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-science-platforms-pure-play-specialist-and-startup-vendors/</loc>
		<lastmod>2022-12-28T18:20:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/812b04c5-radar-tiles-esin-andrew_data-science-pure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-unified-communications-as-a-service-solutions/</loc>
		<lastmod>2022-12-28T19:07:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/add48c5c-kctile2-ppa_uni-comms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-process-and-task-mining-solutions/</loc>
		<lastmod>2022-12-28T19:11:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/995cd83e-kctile2-ppa_task-mining.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/05/487ca7d7-key.shar_.process-and-task-mining_22.031-1_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-business-intelligence-solutions/</loc>
		<lastmod>2022-12-28T19:14:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/cc0ac29e-kctile3-pink-daa_business-intel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-machine-learning-operations-solutions/</loc>
		<lastmod>2022-12-28T19:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/ba4af237-kctile3-pink-daa_machine-learning-ops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-platforms-2/</loc>
		<lastmod>2022-12-28T19:19:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/b7b60a80-kctile1.-ne_edge-plat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-observability-solutions-2/</loc>
		<lastmod>2022-12-28T19:21:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/f8fd4711-kctile1.-ne_net-obs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-as-a-service-solutions/</loc>
		<lastmod>2022-12-28T19:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/fb178a59-kctile1.-ne_network-as-a-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-service-mesh-solutions/</loc>
		<lastmod>2022-12-28T19:29:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/ac7e2da3-kctile1.-ne_service-mesh.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-ddi-solutions/</loc>
		<lastmod>2022-12-28T19:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/43952061-kctile1.-ne_ddi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/09/014769f6-key.mcph_.ddi-v1-22.053_kc_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-digital-experience-platforms/</loc>
		<lastmod>2022-12-28T19:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/2862121b-kctile2-ppa_digital-experience.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-intelligent-document-processing-solutions/</loc>
		<lastmod>2022-12-28T19:37:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/3439d884-kctile2-ppa_intel-doc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-feature-flag-solutions/</loc>
		<lastmod>2022-12-28T19:55:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/0197879c-kctile2v2_feature-flag.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-quality-platforms/</loc>
		<lastmod>2022-12-28T20:05:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/e87de8da-kctile3-pink-daa_data-quality-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-streaming-data-platforms-2/</loc>
		<lastmod>2022-12-28T20:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/01/27dd924f-kctile3-pink-daa_streaming-data-platforms-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-validation-solutions/</loc>
		<lastmod>2022-12-28T20:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/b6230910-kctile1.-ne-network-validation-v2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/11/e29487c6-key.mcph_.network-validation-22.424_kc_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-platforms-for-hybrid-integration-and-automation/</loc>
		<lastmod>2022-12-28T20:26:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/fa0647a5-kctile5-purple-cim_cloud-platforms-for-hybrid-i-and-a.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hybrid-cloud-data-protection-3/</loc>
		<lastmod>2022-12-28T20:28:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/00e7673d-kctile5-purple-cim_hybrid-cloud-data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-patch-management/</loc>
		<lastmod>2022-12-28T20:35:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/5c2b7f50-kctile5-purple-cim_patch-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-governance-solutions/</loc>
		<lastmod>2022-12-28T20:37:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/b1e6261c-kctile5-purple-cim_cloud-gov.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-resource-optimization-solutions/</loc>
		<lastmod>2022-12-28T20:39:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/b4204e92-kctile6-purple-cim_cloud-resource-optimization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/efa323f3-kcr-for-evaluating-cloud-resource-optimization-solutions_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-science-platforms/</loc>
		<lastmod>2022-12-29T00:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/d9fa524a-kctile3-pink-daa_data-science.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-api-management-solutions/</loc>
		<lastmod>2022-12-29T00:20:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/87c714e4-kctile5-purple-cim_api-management-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-object-storage/</loc>
		<lastmod>2022-12-29T00:48:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/03b9ec32-kctile6-purple-cim_object-storage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/a16b77d6-key.sign_.object-storage_v2-22.051-1_kc-_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-observability-solutions/</loc>
		<lastmod>2022-12-29T00:58:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/9171414f-kctile5-purple-cim_cloud-observability.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/362d4b13-rad.will_.cloud-observability-21.017_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-networking-solutions/</loc>
		<lastmod>2022-12-29T01:01:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/a881bdb8-kctile5-purple-cim_cloud-networking-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-migration-tools/</loc>
		<lastmod>2022-12-29T01:05:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/b83f1819-kctile6-purple-cim-data-migration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-aiops-solutions-2/</loc>
		<lastmod>2022-12-29T01:09:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/59f35100-kctile5-purple-cim_aiops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-performance-testing-tools/</loc>
		<lastmod>2022-12-29T01:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/21882e85-kctile6-purple-cim_cloud-performance-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-resource-management-solutions/</loc>
		<lastmod>2022-12-29T01:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/688c122e-kctile6-purple-cim_kubernetes-resource-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-container-security/</loc>
		<lastmod>2022-12-29T01:20:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/b136c754-kccovers-orange-security-2_eval-container-sec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-api-security-solutions/</loc>
		<lastmod>2022-12-29T01:23:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/b0d72c68-kccovers-orange-security-2_api-sec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-penetration-testing-as-a-service-solutions/</loc>
		<lastmod>2022-12-29T01:25:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/002c24a5-kccovers-orange-security-2_pen-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-endpoint-detection-and-response-solutions/</loc>
		<lastmod>2022-12-29T01:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/4c4e6399-kccovers-orange-security-2_endpoint-and-response.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-security-posture-management-solutions/</loc>
		<lastmod>2022-12-29T01:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/632dd38d-kccovers-orange-security-2_cloud-posture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-multifactor-authentication-solutions/</loc>
		<lastmod>2022-12-29T01:34:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/6edbb597-kccovers-orange-security-2_multifactor-auth.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-comprehensive-anti-phishing-solutions/</loc>
		<lastmod>2022-12-29T01:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/bc2506c6-kccovers-orange-security-2_comprehensie-anti-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-evaluating-distributed-denial-of-service-protection-solutions/</loc>
		<lastmod>2022-12-29T01:39:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/36fc35fd-kccovers-orange-security-2_distibution-denial-of-servicfe-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-access-security-broker-solutions/</loc>
		<lastmod>2022-12-29T02:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/35b966ac-kccovers-orange-security-2_cloud-access-sec-broker.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-secure-service-access-2/</loc>
		<lastmod>2022-12-29T02:26:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/68dfa1d4-kccovers-orange-security-2_secure-service-access.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-intelligent-fraud-detection-in-financial-transactions/</loc>
		<lastmod>2022-12-29T02:29:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/b18a7568-kccovers-orange-security-3_intelligent-fraud.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/e4d22a65-key.azof_.intelligent-fraud-detection-21.406-1_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-identity-as-a-service-solutions/</loc>
		<lastmod>2022-12-29T02:31:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/73c9954f-kccovers-orange-security-3_identity-as-a-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-privileged-access-management-solutions/</loc>
		<lastmod>2022-12-29T02:34:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/cc1c7c93-kccovers-orange-security-3_privileged-access-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-application-and-api-protection-solutions/</loc>
		<lastmod>2022-12-29T02:37:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/befcd293-kccovers-orange-security-3_app-and-api.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-attack-surface-management-solutions/</loc>
		<lastmod>2022-12-29T02:39:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/3abc93c8-kccovers-orange-security-3_attack-surface.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-zero-trust-network-access-solutions/</loc>
		<lastmod>2022-12-29T02:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/2594f896-kccovers-orange-security-3_zero-trust.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-threat-intelligence-solutions/</loc>
		<lastmod>2022-12-29T02:45:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/2da9df67-kccovers-orange-security-2_threat-intelligence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-information-and-event-management-solutions/</loc>
		<lastmod>2022-12-29T02:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/b609acc8-kccovers-orange-security-2_sec-and-event-mgmt-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-orchestration-automation-and-response-solutions/</loc>
		<lastmod>2022-12-29T03:05:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/17b5b953-kccovers-orange-security-2_security-orchestration-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-file-based-cloud-storage-solutions/</loc>
		<lastmod>2022-12-29T03:08:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/72234005-kctile8-purple-cim_filebased-cloud-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-human-resource-information-systems-for-small-to-medium-businesses/</loc>
		<lastmod>2022-12-29T15:04:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/9500e390-radar-tile-hris-smb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-value-stream-management-solutions/</loc>
		<lastmod>2022-12-29T16:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/06058e11-kctile1-periwinkle-ppa_value-stream.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-saas-management-platforms/</loc>
		<lastmod>2022-12-29T16:39:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/6a6f20b0-kctile8-purple-cim_saas-mgmt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/06/df1c74f3-key.stoc_.saas-mgt-20.170_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-managed-kubernetes-solutions/</loc>
		<lastmod>2022-12-29T16:42:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/02cab6fb-kctile8-purple-cim_managed-kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-itsm-solutions/</loc>
		<lastmod>2022-12-29T16:55:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/f1f45c2e-kctile8-purple-cim_itsm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-agile-planning-and-portfolio-management-tools/</loc>
		<lastmod>2022-12-29T16:59:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/09332c2f-kctile1-periwinkle-ppa_agile-planning.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-intelligent-virtual-assistants/</loc>
		<lastmod>2022-12-29T17:11:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/5a0701b7-kctile1-periwinkle-ppa_intelligent-virtual-assistant.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hyperscale-compute-alternatives/</loc>
		<lastmod>2022-12-30T20:25:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/35a6d790-kctile7-purple-cim_hyperscale-compute.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-data-protection-solutions/</loc>
		<lastmod>2022-12-30T20:31:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/6163c8d9-kctile7-purple-cim_kubernetes-data-protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/12/255d0aac-fig-3_key.pisc_.kubernetes-data-protection_v3-c-2_kc-draft_fig-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-human-resource-information-systems-for-small-to-medium-businesses/</loc>
		<lastmod>2022-12-30T20:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/495bb7c7-kctile2_hr-is-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/12/231e009a-key.witt_.hris-22.461-1_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hyperconverged-infrastructure-solutions-2/</loc>
		<lastmod>2022-12-30T20:51:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/6f366434-kctile2_hyperconverged-infra.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-api-functional-automated-testing-solutions/</loc>
		<lastmod>2022-12-30T21:24:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/ace12f5e-kctile7-purple-cim_api-automated-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-catalog-solutions/</loc>
		<lastmod>2022-12-30T21:35:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/96129da6-kctile2_data-catalog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-primary-storage-solutions/</loc>
		<lastmod>2022-12-30T21:43:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/bb1d1843-kctile7-purple-cim_primary-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-unified-endpoint-management-solutions/</loc>
		<lastmod>2022-12-30T21:46:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/ba79b5ac-kccovers-orange-security-4_unified-endpoint.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-disaster-recovery-and-business-continuity-as-a-service-solutions/</loc>
		<lastmod>2023-01-02T23:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/ec62035c-kctile2_disaster-recovery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-policy-as-code-solutions/</loc>
		<lastmod>2023-01-03T00:03:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/bf71092d-kctile2_policy-as-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-data-storage-2/</loc>
		<lastmod>2023-01-03T00:10:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/151752b3-kctile2_kubernetes-data-storage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/07/2138c9a9-key.pisc_.kubernetes-data-storage-22.347_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-customer-engagement-platforms/</loc>
		<lastmod>2023-01-04T03:05:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/d8be6911-kctile2_customer-engagement.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/06/20218c21-figure-1_key.cox_.customerengagementplatforms-22.002-1_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-customer-engagement-platforms/</loc>
		<lastmod>2023-01-04T03:13:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/70ccdba8-radar-tile-4_customer-engagement-platforms-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-operating-systems-2/</loc>
		<lastmod>2023-01-04T20:28:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/acb15150-kctile1-yellow-network-edge_network-operating-systems.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-mobile-edge-solutions/</loc>
		<lastmod>2023-01-04T20:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/01/bae1b9e4-kctile2-yellow-network-edge_mobile-edge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-global-lpwan-network-providers/</loc>
		<lastmod>2023-01-04T20:38:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/eba6f01e-kctile2-yellow-network-edge_global-lpwan-network-providers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-industrial-iot-iiot-security-solutions/</loc>
		<lastmod>2023-01-04T20:44:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/9f749c0d-kctile1-yellow-network-edge_industrial-iot-iiot-secur.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-private-lte-and-5g-solutions/</loc>
		<lastmod>2023-01-04T20:47:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/beb32fdf-kctile1-yellow-network-edge_private-lte-and-5g.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-wi-fi-6-6e-solutions/</loc>
		<lastmod>2023-01-04T20:51:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/051ece1b-kctile1-yellow-network-edge_wi-fi-6-6e-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-cloud-and-managed-service-providers/</loc>
		<lastmod>2023-01-04T20:57:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/44d107ba-radar-tile_-network-operating-systems-cloud-and-managed-service-v3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/05/44f1ebc5-figure-1.-rad.grun_.nos-csp_v2-21.040-3_radar-draf_table-1-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-virtual-desktop-infrastructure/</loc>
		<lastmod>2023-01-04T21:37:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/b3a085cf-kctile6-purple-cim_virtual-desktop-infra-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-continuous-vulnerability-management-solutions/</loc>
		<lastmod>2023-01-04T23:30:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/7196b012-kccovers-orange-security-3_cont-vul-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-loss-prevention-solutions/</loc>
		<lastmod>2023-01-04T23:34:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/062aef57-kccovers-orange-security-3_data-loss.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-netdevops-solutions/</loc>
		<lastmod>2023-01-04T23:38:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/3d94c75f-kctile3_nevdevops-v1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-human-capital-management-solutions/</loc>
		<lastmod>2023-01-04T23:45:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/32a73a62-kctile3_human-capital.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/04/0dd8425a-key.witt_.hcm_21.399_kc_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-user-and-entity-behavior-analytics-ueba/</loc>
		<lastmod>2023-01-05T00:18:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/e8e8f6e0-kctile3_user-and-entity-behavior.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-governance-risk-and-compliance-solutions/</loc>
		<lastmod>2023-01-06T16:22:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/998b8dbc-kccovers-orange-security-4_eval-governance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-saas-management-platforms/</loc>
		<lastmod>2023-01-06T19:46:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/f3e092b7-radar-tile-01-23_saas-v3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/07/16af9a9b-rad.stoc_.saas-mgt-20.170_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-software-defined-wide-area-networks/</loc>
		<lastmod>2023-01-09T17:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/bf4505a9-a.-radar-tile-01-23_sd-wan-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unified-endpoint-management/</loc>
		<lastmod>2023-01-09T19:09:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/bed3dcd8-radar-tile-01-23_unified-endpoint-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-gitops/</loc>
		<lastmod>2023-01-09T21:15:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/6ca0d174-radar-tile2_gitops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-governance-risk-and-compliance-grc-solutions/</loc>
		<lastmod>2023-01-09T21:34:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/b09ca8ba-kccovers-orange-security-3-1_governance-risk-compliance-v1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-gitops-solutions/</loc>
		<lastmod>2023-01-09T21:40:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/70a65b7e-kctile3_gitops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-ai-processors-automotive-edition/</loc>
		<lastmod>2023-01-09T22:02:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/01/e3f72d7f-radar-tile2-3ai_edge-ai-processors-automotive.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-data-processing-units/</loc>
		<lastmod>2023-01-09T23:57:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/4f46e09e-sonar-tile-template_data-processing-units-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/01/74893342-son.warr_.storage-accel-dpus-22.497.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-managed-security-services-managed-detection-and-response-mdr/</loc>
		<lastmod>2023-01-11T20:47:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/c05a652c-radar-tile-01-23_managed-detection-and-response.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-governance-risk-and-compliance/</loc>
		<lastmod>2023-01-12T17:09:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/91c5bec3-radar-tile-01-23_governance-risk-compliance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-api-functional-automated-testing/</loc>
		<lastmod>2023-01-13T19:06:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/7e3af67f-radar-tile-4_api-functional-automation-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-primary-storage-for-small-businesses-2/</loc>
		<lastmod>2023-01-20T02:40:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/65b0d217-radar-tile2-3ai_primary-storage-small-businesses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-primary-storage-for-midsize-businesses-2/</loc>
		<lastmod>2023-01-20T02:50:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/ccb3a6df-radar-tile2-3ai_primary-storage-midsize-businesses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-primary-storage-for-large-enterprises-2/</loc>
		<lastmod>2023-01-20T03:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/bc0e0887-radar-tile2-3ai_primary-storage-large-enterprises.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-development-security/</loc>
		<lastmod>2023-01-20T19:23:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/71e789ad-radar-tile-4_development-sec.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-primary-storage-for-large-enterprises/</loc>
		<lastmod>2023-01-20T20:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/98019e4f-radar-tile2-3ai_primary-storage-large-enterprises.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-user-and-entity-behavior-analysis/</loc>
		<lastmod>2023-01-23T21:58:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/6d651a97-radar-tile-01-23_user-entity-behavior.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hyperscale-compute-alternatives/</loc>
		<lastmod>2023-01-23T22:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/0f67c917-radar-tile2-3ai_hyperscale-compute-alternatives.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/the-business-value-of-teleport/</loc>
		<lastmod>2023-01-24T16:27:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/10/03fcbf84-teleport-tco-report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hyperconverged-infrastructure-smb-deployments/</loc>
		<lastmod>2023-01-24T21:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/157c4396-radar-tile-01-23_hci-smb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-regulated-software-lifecycle-management/</loc>
		<lastmod>2023-01-26T17:39:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/306ffca8-radar-tile-reg-software-lm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-data-protection-3/</loc>
		<lastmod>2023-01-26T18:58:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/1d0a400e-radar-tile-01-23_kubernetes-data-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/security-information-and-event-management-a-mitre-attck-framework-competitive-evaluation/</loc>
		<lastmod>2023-01-30T16:12:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/ca02ad98-benchmark-hero-1_performance-benchmark.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-object-storage-3/</loc>
		<lastmod>2023-01-31T06:41:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/02451ca6-radar-tile2_enterprise-object-storage-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-high-performance-object-storage-2/</loc>
		<lastmod>2023-01-31T20:30:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/f98ddbb3-radar-tile2_high-performance-object-storage-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-content-delivery-network-solutions/</loc>
		<lastmod>2023-02-01T15:43:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/c2069fa9-kctile2-2023_content-delivery-network.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-access-control-solutions/</loc>
		<lastmod>2023-02-01T15:48:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/f4caaa24-kctile2-2023_network-access-control.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-application-and-api-security-solutions/</loc>
		<lastmod>2023-02-01T18:47:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/fb20867f-kctile2-2023_app-and-api.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-attack-surface-management-solutions-2/</loc>
		<lastmod>2023-02-03T01:06:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/3ddf67ba-kctile2-2023_attack-surface-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-dns-security-solutions/</loc>
		<lastmod>2023-02-08T15:51:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/512ea359-kctile2-2023_dns-security-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-next-generation-firewall-solutions/</loc>
		<lastmod>2023-02-08T15:54:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/1071b9ed-kctile2-2023_next-generation-firewall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-content-delivery-networks/</loc>
		<lastmod>2023-02-08T23:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/8aaa3455-radar-tile-01-23_content-delivery-networks-v3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-center-switching-solutions/</loc>
		<lastmod>2023-02-09T20:54:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/f35dd02d-kctile2-2023_data-center-switching.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-performance-testing/</loc>
		<lastmod>2023-02-15T16:01:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/7d5a5619-radar_tile_cloud_performance_testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-dns-security/</loc>
		<lastmod>2023-02-15T18:28:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/b9757970-radar_tile_01_23_dns_secv2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/data-warehouses-and-the-distributed-cloud-managed-disruption/</loc>
		<lastmod>2023-02-17T15:53:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/01/sgv.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/the-cost-of-microsoft-365-data-protection/</loc>
		<lastmod>2023-02-17T15:53:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/07/bigstock-Corridor-Of-Server-Room-With-226174915-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-solution-profile-weaveworks/</loc>
		<lastmod>2023-02-17T15:53:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/05/bigstock-Fintech-Icon-On-Abstract-Fina-226174948.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-vendor-profile-osnexus/</loc>
		<lastmod>2023-02-17T15:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/03/6134f7aa-computer-2760136_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/sql-transaction-processing-price-performance-testing-2/</loc>
		<lastmod>2023-02-17T15:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/09/bigstock-Corridor-Of-Server-Room-With-226174957.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hyperconverged-infrastructure/</loc>
		<lastmod>2023-02-17T15:56:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/fcd9041c-data-2899901_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-value-stream-management/</loc>
		<lastmod>2023-02-17T15:56:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/66bfb724-image6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2020/09/2e05314d-image1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-center-switching-2/</loc>
		<lastmod>2023-02-20T13:23:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/aef0d385-radar-tile-01-23_data-center-switching.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/observability-in-the-development-pipeline/</loc>
		<lastmod>2023-02-20T19:09:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/f244a4fa-bti-people.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-access-control/</loc>
		<lastmod>2023-02-20T23:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/88e90ed5-radar-tile-01-23_network-access-control.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cybersecurity-incident-response-solutions/</loc>
		<lastmod>2023-02-25T00:42:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/1bc35356-kctile2-2023_cyber-securityv2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-training-solutions/</loc>
		<lastmod>2023-02-27T15:56:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/251d05bb-kccovers-orange-security-2_security-training-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-alternatives-to-amazon-s3/</loc>
		<lastmod>2023-02-27T15:56:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/a808a127-kctile2-2023_alt-to-amazon-s3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/low-code-process-automation/</loc>
		<lastmod>2023-02-28T00:34:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/04/iStock-1022887882.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-lake-and-lakehouse-solutions/</loc>
		<lastmod>2023-02-28T15:58:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/4d43b74b-kctile3-pink-daa_data-lake-lakehousev2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-integration-platform-as-a-service/</loc>
		<lastmod>2023-02-28T23:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/69285c69-radar-tile2-3ai_intergration-plaftorm-aas-ipaas-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-next-generation-firewalls/</loc>
		<lastmod>2023-03-01T17:36:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/91551c70-radar-tile-01-23_next-generation-firewall-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-lakes-and-lakehouses/</loc>
		<lastmod>2023-03-02T14:18:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/52289c0c-radar-tile-01-23_data-lakes-lakehouses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-gitops-solutions-2/</loc>
		<lastmod>2023-03-02T14:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/2857f6f2-kctile1-teal-devops_gitops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-performance-testing-solutions/</loc>
		<lastmod>2023-03-02T16:48:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/495ea723-kctile2-2023_cloud-performance-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-unstructured-data-management-solutions/</loc>
		<lastmod>2023-03-02T19:02:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/9bba0d6b-kctile8-purple-cim_unstructured-data-management-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-awareness-and-training/</loc>
		<lastmod>2023-03-06T14:16:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/571cc63d-radar-tile-01-23_security-training.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-alternatives-to-amazon-s3-2/</loc>
		<lastmod>2023-03-06T20:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/ee611333-radar-tile-01-23_alternatives-to-amazon-s3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-for-edge-computing-solutions/</loc>
		<lastmod>2023-03-07T15:45:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/ecde10fd-kctile2-2023_kubernetes-for-edge-comp-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-gitops-2/</loc>
		<lastmod>2023-03-07T20:52:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/acf5b146-radar-tile-01-23_gitops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-integration-platform-as-a-service-solutions/</loc>
		<lastmod>2023-03-09T15:25:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/658efd57-kctile3_integration-platform-as-a-service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-managed-kubernetes/</loc>
		<lastmod>2023-03-10T16:19:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/28061da7-radar-tile-01-23_managed-kubernetes-22.555.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-for-edge-computing/</loc>
		<lastmod>2023-03-10T16:21:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/d158787c-radar-tile-01-23_kubernetes-for-edge-computing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-networking-solutions-2/</loc>
		<lastmod>2023-03-10T16:23:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/40973dd4-kctile2-2023_cloud-networking-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cybersecurity-incident-response/</loc>
		<lastmod>2023-03-13T16:25:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/848822a8-radar-tile-01-23_cybersecurity-incident-response-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ci-cd-for-kubernetes/</loc>
		<lastmod>2023-03-14T16:58:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/ebbe320d-radar-tile-01-23_ci-cd-for-kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-e-signature-solutions-2/</loc>
		<lastmod>2023-03-15T14:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/2b31a862-radar-tile-01-23_e-signature-22.609.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/03/e6b66960-key.witt_.esignature_v2-22.609-1_kc_draft_fig_2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-networking-2/</loc>
		<lastmod>2023-03-16T14:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/ab9e1c40-radar-tile3-23_cloud-networking-22607.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-colocation-solutions/</loc>
		<lastmod>2023-03-16T21:47:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/d4a143bb-kc-march-2023_edge-colo-22476-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-colocation-3/</loc>
		<lastmod>2023-03-16T22:23:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/6cfbec05-radar-tile-01-23_edge-colocation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/02/922f52b2-figure-1_revised.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-science-solutions/</loc>
		<lastmod>2023-03-17T13:10:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/63b441d1-kc-march-2023_data-science-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-pipeline-solutions/</loc>
		<lastmod>2023-03-17T21:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/20a0e59f-kc-march-2023_data-pipeline-22610.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-attack-surface-management-2/</loc>
		<lastmod>2023-03-23T18:26:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/9f8756ac-radar-tile-01-23_attack-surface-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-data-resilience-and-management/</loc>
		<lastmod>2023-03-31T14:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/260403d7-decisionbrief-dram-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-pipelines-2/</loc>
		<lastmod>2023-03-24T22:18:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/18e6e21e-radar-tile-23-5_data-pipeline.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-deception-technology-2/</loc>
		<lastmod>2023-03-29T20:46:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/f1446cba-radar-tile-23-5_deception-technology.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-observability-solutions-2/</loc>
		<lastmod>2023-03-29T20:57:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/8a43b5fe-kc-march-2023_cloud-obs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/03/f9dfb931-key.will_.cloud_observability_v3-22.606-1_kc_draft_fig_1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-robotic-process-automation-solutions/</loc>
		<lastmod>2023-03-30T19:25:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/705146d5-kctile3_robotic-process-automation-v4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-robotic-process-automation/</loc>
		<lastmod>2023-03-30T20:59:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/a6d01108-radar-tile3-23_robotic-process-automation-v3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-high-performance-object-storage-3/</loc>
		<lastmod>2023-03-31T16:37:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/535bb589-radar-tile-23-5_object-storage-high-performance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-object-storage-4/</loc>
		<lastmod>2023-03-31T18:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/427a4fe8-radar-tile-23-5_object-storage-enterprise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cloud-analytics-platform-total-cost-of-ownership-2/</loc>
		<lastmod>2023-04-03T21:30:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/0ef638ba-finalbenchmarks-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/managing-microsoft-azure-arc-enabled-infrastructure-from-the-azure-portal/</loc>
		<lastmod>2023-04-03T21:30:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/491d9d7d-bench-cloud-infra-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/understanding-the-tco-of-microsoft-azure-app-service/</loc>
		<lastmod>2023-04-03T21:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/04/491d9d7d-bench-cloud-infra-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/microsoft-power-bi/</loc>
		<lastmod>2023-04-03T21:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/08/gigaom-stories-andrew-blue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-operating-systems-3/</loc>
		<lastmod>2023-04-04T19:24:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/500ca7e2-kctile3_network-operating-systems.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-streaming-data-platforms-3/</loc>
		<lastmod>2023-04-04T19:27:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/756a8762-kc-march-2023_streaming-data-plaforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-extended-detection-and-response-solutions/</loc>
		<lastmod>2023-04-05T18:58:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/ac8e79bd-kc-march-2023_extended-detection-and-response.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-zero-trust-network-access-solutions-2/</loc>
		<lastmod>2023-04-05T19:02:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/e751dbec-kc-march-2023_zero-trust-network-access.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-ci-cd-for-kubernetes-solutions/</loc>
		<lastmod>2023-04-10T16:09:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/a29200eb-kctile3_cicd-kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-object-storage-solutions/</loc>
		<lastmod>2023-04-10T16:09:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/d8825a20-kctile8-purple-cim_object-storage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/02/bc45a64e-key.mort_.object-storage-22.623-1_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-observability-2/</loc>
		<lastmod>2023-04-10T16:57:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/116ac796-radar-tile3-23_cloud-observablity-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-observability-solutions-3/</loc>
		<lastmod>2023-04-11T13:39:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/c5ead7cf-kctile-april-23_network-observability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-object-storage-on-tape-2/</loc>
		<lastmod>2023-04-13T18:26:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/6bdb5ae2-sonar-tile-template_object-storage-on-tape.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/04/3f6b342b-fig1_son.mort_.s3-gateways-for-tape-22.624-1_sonar-draft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-science/</loc>
		<lastmod>2023-04-14T00:16:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/0b86b2e1-radar-tile3-23_data-science.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-cyber-workforce-resilience/</loc>
		<lastmod>2023-04-14T01:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/d3768597-cyber-workforce-resilience-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-streaming-data-platforms/</loc>
		<lastmod>2023-04-14T01:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/c00bda42-radar-tile-april-23_streaming-data-platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-identity-as-a-service-idaas-solutions/</loc>
		<lastmod>2023-04-18T21:52:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/8f8a1cfb-kc-hero_key.stri_.identity-as-a-service-idaas_v2-22.669-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-netdevops-solutions-2/</loc>
		<lastmod>2023-04-19T19:31:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/98aa4b4f-kctile1-yellow-network-edge_netdevops.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/11/03fde94f-key.mcph_.netdevops-v2-22.478-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-governance/</loc>
		<lastmod>2023-04-19T19:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/7f9c5770-radar-tile2-cloud-gov-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-industrial-iot-security/</loc>
		<lastmod>2023-04-19T19:34:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/05/1cca29cb-radarauthortemplate-part-2_industrial-iot_industrial-iot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-e-signature-solutions/</loc>
		<lastmod>2023-04-19T19:35:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/399e0894-radar-tile_e-signatures.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/ad7e40f1-key.witt_.esignature_21.159_fig-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-e-signature-solutions-2/</loc>
		<lastmod>2023-04-19T19:36:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/e41de936-kctile3_e-signature.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-e-signature-solutions/</loc>
		<lastmod>2023-04-19T19:36:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/ac2a370d-kctile1-periwinkle-ppa_e-signature.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-data-protection-2/</loc>
		<lastmod>2023-04-19T19:37:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/49133bc6-kctile5-purple-cim_kubernetes-data-protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/2043e100-k8s-fig-1-try-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-observability-3/</loc>
		<lastmod>2023-04-20T21:03:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/bdefd218-radar-hero_rad.cali_.network-observability_v3-22.664-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-network-service-providers-2/</loc>
		<lastmod>2023-04-20T21:38:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/434083e3-radar-tile-april-23_nos-nsps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/04/673b4fdd-figure-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-cloud-and-managed-service-providers-2/</loc>
		<lastmod>2023-04-20T21:38:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/9bfad26d-radar-tile-april-23_nos-csp-msp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/04/673b4fdd-figure-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-large-enterprises-and-smbs-2/</loc>
		<lastmod>2023-04-20T21:38:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/d66a30f1-radar-tile-april-23_nos-enterprises.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/04/673b4fdd-figure-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-identity-as-a-service-idaas/</loc>
		<lastmod>2023-04-21T14:32:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/8d55a8f5-radar-hero_rad.stri_.identity-as-a-service-idaas_v2-22.669-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-zero-trust-network-access-ztna-2/</loc>
		<lastmod>2023-04-21T17:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/bce72210-radar-hero_rad.ray_.ztna_v2-22.649-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-and-core-routing-solutions/</loc>
		<lastmod>2023-04-21T19:28:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/3b4621ca-kc-hero_key.cali_.edge-and-core-routing-hw-sw_v1-22.608-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-data-governance/</loc>
		<lastmod>2023-04-26T13:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/d840417a-decisionbrief-1-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-platforms-3/</loc>
		<lastmod>2023-04-28T19:30:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/453a6222-kctile-april-23_edge-platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-resource-optimization-solutions-2/</loc>
		<lastmod>2023-05-01T19:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/68945374-kctile-april-23_cloud-resource-opt-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/04/617643a6-key.jall_.cloud-resource-op_v2-22.605-1_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-resource-optimization-2/</loc>
		<lastmod>2023-05-02T15:06:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/86b2d074-radar-tile-april-23_cloud-resource-optimization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection-large-enterprises/</loc>
		<lastmod>2023-05-03T19:23:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/8f993ad3-radar-tile_hcdp-enterprise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-governance/</loc>
		<lastmod>2023-05-03T19:24:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/543159b0-radar-tile-01-23_data-governance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-governance-solutions-2/</loc>
		<lastmod>2023-05-03T19:24:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/01/0809d956-kctile2-2023_data-governance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unstructured-data-management-business-focused-solutions/</loc>
		<lastmod>2023-05-04T19:23:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/6553981a-radar-tile-3_unstructured-data-management-business.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unstructured-data-management-infrastructure-focused-solutions/</loc>
		<lastmod>2023-05-04T19:24:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/82bce6bf-radar-tile-3_unstructured-data-management-infrastructure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unstructured-data-management-business-focused-solutions-2/</loc>
		<lastmod>2023-05-04T19:24:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/878e26ed-radar-tile-23-5_udm-business-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unstructured-data-management-infrastructure-focused-solutions-2/</loc>
		<lastmod>2023-05-04T19:24:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/926e07ba-radar-tile-23-5_udm-infra-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-gigaom-radar-for-streaming-data-platforms-streaming-data-specialist-vendors/</loc>
		<lastmod>2023-05-04T19:24:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/9198d12b-radar-tiles-esin-andrew_streaming-specialist.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-virtualization-solutions/</loc>
		<lastmod>2023-05-04T19:24:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/08/e723918b-kctile3-pink-daa_data-virt-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-virtualization-pure-play-vendors/</loc>
		<lastmod>2023-05-04T19:24:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/03d7c94b-radar-tile-data-virt-play.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-virtualization-enterprise-vendors/</loc>
		<lastmod>2023-05-04T19:25:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/df7e46fc-radar-tile-data-virt-enterprise.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-streaming-data-platforms-cloud-providers-enterprise-incumbents-and-data-platform-vendors/</loc>
		<lastmod>2023-05-04T19:28:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/c2f27058-radar-tiles-esin-andrew_streaming-general.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-operational-technology-ot-security-solutions/</loc>
		<lastmod>2023-05-05T14:20:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/c86c094d-kc-2023-may-tiles_operational-tech.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-low-code-development-platforms/</loc>
		<lastmod>2023-05-05T15:49:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/65df21f9-kctile1-periwinkle-ppa_low-code-dev-platforms.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/03/7b2eeabd-key.kruc_.low-code_v2-22.026-_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-low-code-development-platforms/</loc>
		<lastmod>2023-05-05T15:49:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/aebe1dd1-radar-tile_low-code-development-platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-application-security-testing-solutions/</loc>
		<lastmod>2023-05-05T21:44:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/d29c81f2-kctile-april-23_application-security-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-kubernetes-data-protection/</loc>
		<lastmod>2023-05-09T21:12:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/eacc8a07-decisionbrief-kdp-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-data-lakehouses-and-data-driven-operation/</loc>
		<lastmod>2023-05-09T21:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/713426d9-decisionbrief-dladdo-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-cloud-change-intelligence/</loc>
		<lastmod>2023-05-09T21:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/8f6e6bdf-decisionbrief-cci-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-distributed-denial-of-service-ddos-protection-solutions/</loc>
		<lastmod>2023-05-09T21:29:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/f7bd57de-kc-2023-may-tiles_ddos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-it-service-management-itsm/</loc>
		<lastmod>2023-05-10T21:03:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/402aa66c-radar-tile-may-23_itsm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-maturity-model-ci-cd/</loc>
		<lastmod>2023-05-12T21:34:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/1f4d4600-cloudbees-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-hybrid-cloud-data-protection-solutions/</loc>
		<lastmod>2023-05-15T21:10:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/d0ac7f37-kc-hero_-2023-may-tiles_hybrid-cloud-data-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-high-performance-object-storage/</loc>
		<lastmod>2023-05-17T17:56:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/04/67d7a96e-imagelikeembed-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-rpa-tools/</loc>
		<lastmod>2023-05-17T17:56:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/4b363085-kctile3_rpa-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-ipaas-solutions/</loc>
		<lastmod>2023-05-17T17:56:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/01/Isometric-959162414_2003x1502.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-edge-ai-processors/</loc>
		<lastmod>2023-05-17T17:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2021/12/06db9ef3-kctile3_edge-ai-processors.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-managed-kubernetes-solutions-2/</loc>
		<lastmod>2023-05-17T19:12:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/f8ccef68-kctile2-2023_managed-kubernetes-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-deception-technology-solutions/</loc>
		<lastmod>2023-05-17T19:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/8353c502-kc-march-2023_deception-tech-22675.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-policy-as-code-solutions/</loc>
		<lastmod>2023-05-17T19:12:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/307ee202-kctile-april-23_security-policy-as-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-secure-service-access-ssa/</loc>
		<lastmod>2023-05-18T14:34:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/f8b48a8f-a_radar-tile-may-23_ssa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-policy-as-code/</loc>
		<lastmod>2023-05-18T20:24:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/5b0f23eb-client-radar-may-tile-laura_security-policy-as-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-and-core-routing/</loc>
		<lastmod>2023-05-19T23:12:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/6f7cc33d-client-radar-may-tile-l_edge-and-core-routing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-secure-service-access-ssa-solutions/</loc>
		<lastmod>2023-05-19T23:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/9f805ad2-kctile-may-23-l_secure-service-access-ssa-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-agile-planning-and-portfolio-management-ppm-solutions/</loc>
		<lastmod>2023-05-23T18:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/8e2670d2-kctile-may-23-l_evaluating-agile-planning-and-portfolio-management-ppm-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/video-sdk-benchmark-comparison/</loc>
		<lastmod>2023-05-24T16:36:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/157f08d7-sdk-zoom-cover-27.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-it-service-management-itsm-solutions/</loc>
		<lastmod>2023-05-24T18:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/a218b8e2-kctile-may-23-l_itsm-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-value-stream-management-vsm-solutions/</loc>
		<lastmod>2023-05-24T18:55:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/77da335b-kc-headshots-jon-collins_jon-collins.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-saas-management-platforms-smps/</loc>
		<lastmod>2023-05-30T16:13:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/149a98ab-kctile-may-23-l_saas-management-platforms-smps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/05/4f8c2ecf-key.jall_.saas-management_v2-22.654-1_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-unified-communications-as-a-service-ucaas-solutions/</loc>
		<lastmod>2023-05-30T17:01:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/813b4e39-kctile-may-23-l_unified-communications-as-a-service-ucaas-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-platforms-3/</loc>
		<lastmod>2023-05-30T23:07:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/ba77b073-radar-may-tile-l_edge-platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-ci-cd/</loc>
		<lastmod>2023-05-31T13:05:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2018/04/bigstock-215289112-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-ci-cd-solutions/</loc>
		<lastmod>2023-05-31T13:05:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2019/04/Internet-of-things-wireless-sensor-network-612825560_3532x2826-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-finops/</loc>
		<lastmod>2023-05-31T23:10:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/c973b2ed-radar-tile-may-23_cloud-finops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-data-security-storage-posture-dssp-for-data-protection/</loc>
		<lastmod>2023-06-01T22:54:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/69a2d389-sonar-tile_dssp-data-protection.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/05/106ab2d5-figure-1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-saas-management-platforms-smps/</loc>
		<lastmod>2023-06-02T22:57:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/c9c315c0-radar-may-tile-l_saas-management-platforms-smps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-internet-resilience/</loc>
		<lastmod>2023-06-05T20:45:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/5ab73e25-decisionbrief-1-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unified-communications-as-a-service-ucaas-2/</loc>
		<lastmod>2023-06-06T17:17:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/66109a97-radar-tile-may-23_ucaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-aiops-solutions-3/</loc>
		<lastmod>2023-06-06T22:56:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/c37414d5-kctile-may-23-l_aiops-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-streaming-data-platforms/</loc>
		<lastmod>2023-06-08T17:54:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/b157d1f0-streaming-data-platforms-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-finops-solutions/</loc>
		<lastmod>2023-06-08T18:36:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/6d16a75b-kctile-may-23-lv2_cloud-finops-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-value-stream-management-vsm/</loc>
		<lastmod>2023-06-09T16:26:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/e259e0c1-client-radar-may-tile-l_value-stream-management-vsm-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection-for-large-enterprises/</loc>
		<lastmod>2023-06-09T17:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/44160bd1-radar-tiles-june-23_hybrid-cloud-data-protection-large.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection-for-small-and-medium-sized-businesses-smbs/</loc>
		<lastmod>2023-06-09T18:07:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/4a63e5ff-radar-tiles-june-23_hybrid-cloud-data-protection-smb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-aiops-2/</loc>
		<lastmod>2023-06-13T23:45:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/81b0175f-radar-tiles-june-23_aiops.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/06/65fcac10-fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/06/72b03aa7-fig-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-operational-technology-ot-security/</loc>
		<lastmod>2023-06-16T17:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/c2c619aa-radar-tile-may-23_operational-technology-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-information-and-event-management-siem-solutions/</loc>
		<lastmod>2023-06-20T16:47:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/13ebb117-kc-2023-may-tiles_siem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-anti-phishing-solutions/</loc>
		<lastmod>2023-06-27T19:34:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/4cda2997-kc-cover-june-23_antiphishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-data-security-storage-posture-dssp-for-primary-storage/</loc>
		<lastmod>2023-06-29T21:45:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/3332fb59-sonar-tile-template_dssp-primary-storage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/05/106ab2d5-figure-1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-data-storage-security-posture-dssp-for-data-security-infrastructure/</loc>
		<lastmod>2023-06-29T22:07:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/6b3b8153-sonar-tile-template_dssp-data-security-infra.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/05/106ab2d5-figure-1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-security-posture-management-cspm-solutions/</loc>
		<lastmod>2023-07-12T02:58:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/db1b44f1-kc-cover-june-23_cspm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-information-and-event-management-siem/</loc>
		<lastmod>2023-07-12T15:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/b1754123-radar-tiles-june-23_siem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-anti-phishing/</loc>
		<lastmod>2023-07-12T15:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/06/04469fbd-radar-tiles-june-23_anti-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-kubernetes-data-storage-solutions/</loc>
		<lastmod>2023-07-12T21:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/b6dc2055-kc-cover-june-23_data-storage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/07/024dd23f-key.pisc_.k8-data-storage_v4-23.790-1_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-api-security-solutions-2/</loc>
		<lastmod>2023-07-12T21:18:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/f3e1d4ed-kc-tiles-july-23_api-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-distributed-denial-of-service-ddos-protection/</loc>
		<lastmod>2023-07-13T15:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/b4bc7a91-radar-tiles-june-23_ddos-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-kubernetes-data-storage-3/</loc>
		<lastmod>2023-07-18T15:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/3d2c8ddb-radar-july-23_ent-kubernetes-ds.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-native-kubernetes-data-storage-3/</loc>
		<lastmod>2023-07-18T15:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/7943782f-radar-july-23_cloud-native-kubernetes-ds.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-access-security-broker/</loc>
		<lastmod>2023-07-14T15:39:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/226e82ae-radar-tile_cloud-access-security-broker-v2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-continuous-vulnerability-management-solutions-2/</loc>
		<lastmod>2023-07-18T15:51:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/96fdddfb-kc-cover-june-23_cont-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-extended-detection-and-response-xdr/</loc>
		<lastmod>2023-07-24T15:40:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/3638747c-radar-tile-april-23_xdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-and-api-security/</loc>
		<lastmod>2023-07-27T21:26:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/02/ce473dd5-radar-tile-01-23_app-api-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-loss-prevention-dlp-solutions/</loc>
		<lastmod>2023-08-02T21:54:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/37bb6e5e-kc-tiles-july-23_dlp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-security-posture-management-cspm/</loc>
		<lastmod>2023-08-11T15:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/0b09290e-radar-tiles-august-23_cspm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-loss-prevention-dlp/</loc>
		<lastmod>2023-08-16T15:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/9faf091e-radar-tiles-august-23_dlp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cloud-data-warehouse-vs-cloud-data-lakehouse/</loc>
		<lastmod>2023-08-09T18:32:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/a5931341-cdw-v-cdl-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-service-mesh-solutions-2/</loc>
		<lastmod>2023-08-10T18:40:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/7c35a0cf-kc-tiles-august-23_service-mesh.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-detection-and-response-ndr-solutions/</loc>
		<lastmod>2023-08-10T18:41:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/a8ea49da-kc-tiles-july-23_ndr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/edge-bare-metal-benchmark-lumen-vs-aws/</loc>
		<lastmod>2023-08-15T16:26:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/4b38f039-edge-bare-metal-benchmark-lumen-vs-aws.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-observability-solutions/</loc>
		<lastmod>2023-08-15T18:11:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/87a3a8b5-kc-tiles-august-23_data-obs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-continuous-vulnerability-management-2/</loc>
		<lastmod>2023-08-15T19:32:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/aa931cb7-radar-tiles-august-23_vul-magt-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-file-based-primary-storage-ransomware-protection-2/</loc>
		<lastmod>2023-08-23T15:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/c85fb4ca-header-tile-template_fb-primary-storage-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/08/f2b71bac-fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-block-based-primary-storage-ransomware-protection-2/</loc>
		<lastmod>2023-08-23T15:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/933dbd6c-header-tile-template_block-primary-storage-ransomware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/08/817fbf7a-fig-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-observability/</loc>
		<lastmod>2023-08-24T15:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/6400233d-radar-tiles-august-23_data-obs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-ddi-solutions-2/</loc>
		<lastmod>2023-08-17T18:50:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/3fb57650-kc-tiles-august-23_ddi-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/08/45278af7-key.mcph_.ddi_v2-23.779-1_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-solutions/</loc>
		<lastmod>2023-08-17T21:18:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/3093c89b-kc-tiles-august-23_soar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/digital-analytics-and-measurement-tools-evaluation/</loc>
		<lastmod>2023-08-21T12:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/cc9a18ac-digital-analytics-and-measurement-tools-evaluation-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-storage-as-a-service-staas/</loc>
		<lastmod>2023-08-30T15:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/5efe47a6-1.-sonar-tile-template_staas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-security-testing/</loc>
		<lastmod>2023-09-01T15:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/0dfbe50e-radar-tiles-august-23_application-security-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-detection-and-response-ndr/</loc>
		<lastmod>2023-08-28T15:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/63b05db1-1.-radar-tiles-august-23_ndr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-semantic-layers-and-metrics-stores/</loc>
		<lastmod>2023-08-30T15:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/b6538ea5-1.-sonar-tile-template_sematic-layers-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/08/6c41759e-fig-1_son.brus_.semantic-layers-metric-store_v1-23.817_sonar_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-digital-experience-platforms-dxps/</loc>
		<lastmod>2023-08-29T17:32:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/d606e4a3-1.-kc-tiles-august-23_dxp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-intelligent-document-processing-idp-solutions/</loc>
		<lastmod>2023-08-29T17:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/689184e7-1.-kc-tiles-august-23_idp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-digital-experience-platforms-dxps/</loc>
		<lastmod>2023-09-05T15:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/fc05f1ec-radar-tiles-august-23_dxp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-orchestration-automation-and-response-soar-2/</loc>
		<lastmod>2023-09-05T15:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/a23fbc53-radar-tiles-august-23_soar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-as-a-service-naas-solutions/</loc>
		<lastmod>2023-08-31T18:21:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/f00a937b-kc-tiles-august-23_naas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-intelligent-document-processing-idp/</loc>
		<lastmod>2023-09-07T15:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/6cbb07c2-radar-tiles-august-23_idp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-service-mesh-2/</loc>
		<lastmod>2023-09-06T17:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/1147bab3-radar-tiles-august-23_service-mesh.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/c300018a-figure-1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-endpoint-detection-and-response-edr-solutions/</loc>
		<lastmod>2023-09-08T01:03:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/0ab1299b-kc-tiles-sept-23_edr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-patch-management-solutions/</loc>
		<lastmod>2023-09-08T01:08:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/99b99f1f-kc-tiles-sept-23_patch-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ddi-2/</loc>
		<lastmod>2023-09-11T15:27:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/02c9615c-1.-radar-tiles-august-23_ddi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/08/c58c75b9-figure-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/son-brus-data-fabric_v1-23-818-1/</loc>
		<lastmod>2023-09-12T17:02:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/52a3bdd8-sonar-tile-template_data-fabric.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-e-discovery-solutions/</loc>
		<lastmod>2023-09-13T15:54:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/09/747ba278-kc-tiles-july-23_e-disc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-e-discovery-solutions-2/</loc>
		<lastmod>2023-09-13T16:07:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/c1cf4fb2-kc-tiles-sept-23_e-discovery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-multifactor-authentication-mfa-solutions/</loc>
		<lastmod>2023-09-13T16:11:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/d487fa2f-kc-tiles-sept-23_mfa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-network-validation-solutions-2/</loc>
		<lastmod>2023-09-13T23:20:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/f081c0c4-kc-tiles-sept-23_network-validation.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/178f2bbf-key.netw_.mcph_.networkvalidation.230879-2.v2_kc-draft-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-as-a-service-naas/</loc>
		<lastmod>2023-09-25T15:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/e795b21a-radar-tiles-sept-23_naas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-patch-management/</loc>
		<lastmod>2023-09-26T15:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/11d1e60a-radar-tiles-sept-23_patch-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-management-platforms-cmps/</loc>
		<lastmod>2023-09-21T20:50:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/b65115fa-kc-tiles-sept-23_cmp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/bf1300a6-fig-1_key.clou_.hern_.cmp_.230845-1.v2_kc-draft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-validation-2/</loc>
		<lastmod>2023-10-03T15:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/367f84af-radar-tiles-sept-23_network-validation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-delivering-on-sovereign-cloud/</loc>
		<lastmod>2023-09-26T17:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/7fceb338-decisionbrief-1-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-management-platforms-cmps/</loc>
		<lastmod>2023-10-04T15:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/07e84b05-radar-tiles-sept-23_cmps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-catalog-solutions-2/</loc>
		<lastmod>2023-09-29T21:25:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/d9be151e-kc-tiles-sept-23_data-catalog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-digital-asset-management-dam-solutions/</loc>
		<lastmod>2023-10-03T17:16:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/59726e43-kc-tiles-sept-23_dam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-upgrade-to-new-microsoft-teams/</loc>
		<lastmod>2023-10-05T15:00:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/5d03cfc0-upgrade-to-microsoft-teams-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-multifactor-authentication-mfa/</loc>
		<lastmod>2023-10-12T15:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/d40d4a30-radar-tiles-oct-23_mfa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-private-5g/</loc>
		<lastmod>2023-10-09T23:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/09/c0441cf1-private-5g-cxo-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-cloud-based-data-protection/</loc>
		<lastmod>2023-10-17T15:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/a977944f-sonar-tile-template_cloud-based-data-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-catalogs-3/</loc>
		<lastmod>2023-10-17T15:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/2a930eb1-radar-tiles-oct-23_data-catalogs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-e-discovery-2/</loc>
		<lastmod>2023-10-12T15:48:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/0f1bb2e2-radar-tiles-sept-23_e-discovery-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-endpoint-detection-and-response-edr/</loc>
		<lastmod>2023-10-13T18:47:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/f7c44750-radar-tiles-oct-23_edr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-password-management-solutions/</loc>
		<lastmod>2023-10-19T14:16:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/06/99d93d24-kc-tiles-oct-23_enterpise-pw-mgmt-2022.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-password-management/</loc>
		<lastmod>2023-10-19T14:53:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/07/a953858f-radar-tiles-oct-23_enterprise-pw-mgmt-2022.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2022/07/d03bae29-rad.grun_.password-manager-21.146-graphics_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-password-management-solutions-2/</loc>
		<lastmod>2023-10-19T15:10:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/39f2ae34-kc-tiles-oct-23_enterprise-pw-mgmt-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-password-management-2/</loc>
		<lastmod>2023-10-19T15:18:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/f9db7b9b-radar-tiles-oct-23_enterprise-pw-mgmt-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/tco-for-data-masking-and-tdm-solutions/</loc>
		<lastmod>2023-10-19T16:07:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/c0401ecd-finalbenchmarks-09.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-file-storage-solutions/</loc>
		<lastmod>2023-10-20T18:54:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/3cb664e9-kc-tiles-oct-23_cloud-file-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-autonomous-security-operations-center-soc-solutions/</loc>
		<lastmod>2023-10-23T19:05:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/28097306-kc-tiles-oct-23_soc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-data-warehouse-solutions-2/</loc>
		<lastmod>2023-10-23T19:05:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/026aa167-kc-tiles-oct-23_data-warehouse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-performance-management-apm/</loc>
		<lastmod>2023-10-23T19:06:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/e0e11276-radar-tiles-oct-23_apm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/1dae7bde-fig-1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-threat-intelligence-platforms-tips/</loc>
		<lastmod>2023-10-23T19:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/0c216915-kc-tiles-oct-23_tips.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-ransomware-prevention-solutions/</loc>
		<lastmod>2023-10-23T19:14:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/0a2f4ee8-kc-tiles-oct-23_ransomware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ransomware-prevention/</loc>
		<lastmod>2023-10-31T15:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/99b1c473-radar-tiles-oct-23_ransomeware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-digital-asset-management-dam/</loc>
		<lastmod>2023-11-02T15:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/de5c0908-radar-tiles-oct-23_dam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-penetration-testing-as-a-service-ptaas-solutions/</loc>
		<lastmod>2023-10-26T14:36:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/0e6acb5a-kc-tiles-oct-23_ptaas-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-regulated-software-lifecycle-management-rslm-solutions/</loc>
		<lastmod>2023-10-27T15:10:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/4db306e7-kc-tiles-oct-23_rslm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-cloud-network-security-solutions/</loc>
		<lastmod>2023-10-27T18:21:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/addcb37b-kc-tiles-oct-23_cloud-networkk-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-distributed-cloud-file-storage-3/</loc>
		<lastmod>2023-11-08T16:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/eb4f7d8f-radar-tiles-oct-23_distributed-cloud-file-.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-autonomous-security-operations-center-soc/</loc>
		<lastmod>2023-11-01T19:55:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/fada227e-radar-tiles-oct-23_soc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-high-performance-cloud-file-storage/</loc>
		<lastmod>2023-11-08T16:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/b065de05-radar-tiles-oct-23_high-performance-cloud-file.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-regulated-software-lifecycle-management-rslm-2/</loc>
		<lastmod>2023-11-10T16:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/256a91b1-radar-tiles-oct-23_rslm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-scale-out-file-storage-solutions-2/</loc>
		<lastmod>2023-11-06T19:42:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/d57b9655-kc-tiles-oct-23_scaleout.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-penetration-testing-as-a-service-ptaas/</loc>
		<lastmod>2023-11-07T16:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/7e10535d-radar-tiles-oct-23_ptaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-application-performance-management-apm-solutions/</loc>
		<lastmod>2023-11-07T14:35:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/b74586f3-kc-tiles-oct-23_apm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-data-processing-units-dpus/</loc>
		<lastmod>2023-11-16T16:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/01d5219c-sonar-tile-template_dpus.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/34ffdc7b-fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-container-security-solutions/</loc>
		<lastmod>2023-11-09T22:17:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/20c57313-kc-tiles-oct-23_container.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-threat-intelligence-platforms-tips/</loc>
		<lastmod>2023-11-13T16:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/10/631895e6-radar-tiles-oct-23_threatintelligence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-incident-response-platforms/</loc>
		<lastmod>2023-11-24T16:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/74e58902-radar-tiles-nov-23_incident-response-platforms.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/ff1e85a8-rad.clou_.will_.incidentresponseplatforms.220660-2.v2_radar-draft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/key-criteria-for-evaluating-incident-response-platforms-irps/</loc>
		<lastmod>2023-11-28T16:53:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/df5c6b51-kc-tiles-nov.2-23_incident.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-user-and-entity-behavior-analytics-ueba-solutions/</loc>
		<lastmod>2023-11-30T18:22:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/37149b74-kc-tiles-nov.2-23_ueba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-api-functional-automated-testing-solutions/</loc>
		<lastmod>2023-11-30T18:56:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/e0f0a008-kc-tiles-nov.2-23_api.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-security-platforms-dsps/</loc>
		<lastmod>2023-11-30T19:05:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/1dd1a555-kc-tiles-nov.2-23_dsp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-software-defined-wide-area-network-sd-wan-solutions/</loc>
		<lastmod>2023-11-30T19:16:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/cd507fc4-kc-tiles-nov.2-23_sdwan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-api-security-2/</loc>
		<lastmod>2023-11-30T19:25:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/08/9d635fb9-radar-tiles-august-23_api-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-content-delivery-network-cdn-solutions/</loc>
		<lastmod>2023-11-30T20:32:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/05a00390-kc-tiles-nov.2-23_content-delivery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-scale-out-file-storage-2/</loc>
		<lastmod>2023-12-01T18:30:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/75a0593e-radar-tiles-nov-23_scale-out-file.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/ipaas-tools-evaluation-security-and-governance-report/</loc>
		<lastmod>2023-12-06T16:30:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/6003c994-workato-update-18.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/35e3249d-fig01_exec-summ-results.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-security-platforms-dsps/</loc>
		<lastmod>2023-12-11T16:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/244a0ae1-radar-tiles-nov-23_dsp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-user-and-entity-behavior-analysis-ueba/</loc>
		<lastmod>2023-12-11T16:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/ae92cd6d-radar-tiles-nov-23_ueba.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-software-defined-wide-area-networks-sd-wans/</loc>
		<lastmod>2023-12-11T16:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/bc345301-radar-tiles-nov-23_sdwan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-api-functional-automated-testing-2/</loc>
		<lastmod>2023-12-11T20:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/9d1e5060-radar-tiles-nov-23_api-fucntional-auto.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-managed-kubernetes-solutions/</loc>
		<lastmod>2023-12-11T23:52:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/ff52a205-kc-tiles-nov.2-23_managed-kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-network-security/</loc>
		<lastmod>2023-12-14T02:08:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/5c4bacf2-radar-tiles-nov-23_cloud-network-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/benchmarked-vector-search-databases/</loc>
		<lastmod>2023-12-15T14:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/5fbfba6d-vector-databases-compared-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-kubernetes-data-protection-solutions/</loc>
		<lastmod>2023-12-19T19:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/6b25767d-kc-tiles-dec-23_k8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-warehouses-3/</loc>
		<lastmod>2024-01-12T00:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/56bff60a-radar-tiles-oct-23_data-warehouses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-managed-kubernetes-2/</loc>
		<lastmod>2024-01-15T21:44:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/0a6c9d41-radar-tiles-dec-23_manage-kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-data-protection-4/</loc>
		<lastmod>2024-01-15T21:44:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/af3fc674-radar-tiles-dec-23_k8-data-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unified-endpoint-management-uem-2/</loc>
		<lastmod>2024-01-15T21:44:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/5b7d6b9d-radar-tiles-jan-23_uem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-process-automation-epa/</loc>
		<lastmod>2024-01-15T21:44:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/170eda1e-radar-tiles-jan-23_epa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-workload-security-cws/</loc>
		<lastmod>2024-01-15T21:44:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/862d36e9-radar-tiles-dec-23_cws.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-5g/</loc>
		<lastmod>2024-01-15T21:44:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/106e357e-radar-tiles-jan-23_hybrid-5g.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/ed464b5f-figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-content-delivery-networks-cdns/</loc>
		<lastmod>2024-01-15T21:44:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/daad9e97-radar-tiles-nov-23_content-delivery-networks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/costs-and-benefits-of-net-application-migration-to-the-cloud-3/</loc>
		<lastmod>2024-01-15T21:45:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/108b2379-costs-and-benefits-of-.net-application-migration-to-the-cloud-24.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-enterprise-process-automation-epa-solutions/</loc>
		<lastmod>2024-01-15T21:45:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/1ebbb4fa-kc-tiles-dec-23_epa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-primary-storage-solutions/</loc>
		<lastmod>2024-01-15T21:45:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/b8dbd8eb-kc-tiles-dec-23_primary-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-hybrid-5g-solutions/</loc>
		<lastmod>2024-01-15T21:45:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/3aeffdca-kc-tiles-dec-23_5g.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-unified-endpoint-management-uem-solutions/</loc>
		<lastmod>2024-01-15T21:45:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/c7a58871-kc-tiles-dec-23_uem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-workload-security-cws-solutions/</loc>
		<lastmod>2024-01-15T21:45:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/1cd663b9-kc-tiles-dec-23_cws.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-container-security-2/</loc>
		<lastmod>2024-01-19T18:35:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/11/b4e31706-radar-tiles-nov-23_container-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-primary-storage-for-large-enterprises-3/</loc>
		<lastmod>2024-01-26T16:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/10303c49-radar-jan-24_primarystorage-large.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-primary-storage-for-midsize-businesses-3/</loc>
		<lastmod>2024-01-26T16:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/7b43033c-radar-jan-24_primarystorage-mid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-kubernetes-resource-management-solutions/</loc>
		<lastmod>2024-01-23T22:30:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/c20571e0-kc-tiles-jan-24_kubernetesresource.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-secure-access-service-edge-sase-solutions/</loc>
		<lastmod>2024-01-25T19:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/8bc4c5ce-kc-tiles-jan-24_sase.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-secure-access-service-edge-sase/</loc>
		<lastmod>2024-02-01T16:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/e299ad37-radar-tiles-jan-24_sase.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-center-switching-solutions/</loc>
		<lastmod>2024-01-30T22:20:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/0a933e9d-kc-tiles-jan-24_datacenterswitching.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-e-signature-solutions/</loc>
		<lastmod>2024-02-01T15:53:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/3807f9f5-kc-tiles-jan-24_e-sig.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-lake-and-lakehouse-solutions/</loc>
		<lastmod>2024-02-01T20:54:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/6e8fe5f9-kc-tiles-jan-24_datalake.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-netdevops-3/</loc>
		<lastmod>2024-02-13T16:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/11e0549a-radar-tiles-feb-24_netdevops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-netdevops-solutions/</loc>
		<lastmod>2024-02-08T20:37:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/218447ff-kc-tiles-jan-24_netdevops.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/6f1e0e8a-key.netw_.mcph_.netdevops.230924-2.v3_kc-draft.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-container-networking/</loc>
		<lastmod>2024-02-09T17:05:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/8a81d6a9-sonar-tile-template_container-networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-access-governance-solutions/</loc>
		<lastmod>2024-02-09T18:25:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/0865bc78-kc-tiles-jan-24_data-gov.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-center-switching-3/</loc>
		<lastmod>2024-02-16T16:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/2ca397cc-radar-tiles-feb-24_data-center-swtiching.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-lakes-and-lakehouses-2/</loc>
		<lastmod>2024-02-19T16:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/5817ae87-radar-tiles-feb-24_data-lakes-and-lhs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-networking-solutions/</loc>
		<lastmod>2024-02-19T17:23:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/c8eecc12-kc-tiles-feb-24_cloud-networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-dns-security-solutions/</loc>
		<lastmod>2024-02-21T16:54:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/6f68a797-kc-tiles-jan-24_dns.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-attack-surface-management-asm/</loc>
		<lastmod>2024-02-22T20:12:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/92d7607d-radar-tiles-feb-24_asm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-alternatives-to-amazon-s3/</loc>
		<lastmod>2024-02-26T21:46:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/28109682-kc-tiles-feb-24_s3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-alternatives-to-amazon-s3-3/</loc>
		<lastmod>2024-03-04T16:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/63225d92-radar-tiles-feb-24_alt-s3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-customer-data-platforms-cdps/</loc>
		<lastmod>2024-03-05T16:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/e3b90048-radar-tiles-feb-24_cdp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-performance-testing-solutions/</loc>
		<lastmod>2024-02-28T19:30:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/d85c9234-kc-tiles-feb-24_cloud-per.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-gitops-solutions/</loc>
		<lastmod>2024-02-28T19:36:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/5f176387-kc-tiles-feb-24_gitops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-resource-management/</loc>
		<lastmod>2024-02-28T19:36:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/b1085b4d-radar-tiles-feb-24_kubernetes-resource-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-customer-data-platforms-cdps/</loc>
		<lastmod>2024-02-28T19:41:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/927dee6a-kc-tiles-feb-24_cdp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-application-and-api-security-aas-solutions/</loc>
		<lastmod>2024-02-28T19:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/4ea36cda-kc-tiles-feb-24_aas.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/ff3686c5-key.secu_.macv_.appapisecurity.230908-1.v3_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-enterprise-firewall-solutions/</loc>
		<lastmod>2024-02-29T17:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/4c25acdb-kc-tiles-feb-24_firewall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-deception-technology-solutions/</loc>
		<lastmod>2024-02-29T17:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/b5309af3-kc-tiles-feb-24_deception.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-network-operating-systems-noss/</loc>
		<lastmod>2024-02-29T18:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/f0f99fa5-kc-tiles-feb-24_nos.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-data-fabric-solutions-and-sap-datasphere/</loc>
		<lastmod>2024-03-01T16:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/2b6e296f-data-fabric-solutions-and-sap-datasphere-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-it-asset-management-itam-solutions/</loc>
		<lastmod>2024-02-29T23:11:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/a05f4913-kc-tiles-feb-24_itam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-and-api-security-aas/</loc>
		<lastmod>2024-03-08T16:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/ab241f89-radar-tiles-feb-24_aas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-disaster-recovery-and-business-continuity-as-a-service-dr-bcaas-solutions/</loc>
		<lastmod>2024-03-04T16:15:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/94260dd0-kc-tiles-feb-24_dr-bcaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-time-series-databases/</loc>
		<lastmod>2024-03-11T15:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/74b97969-radar-tiles-march-24_timeseries.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-performance-testing-2/</loc>
		<lastmod>2024-03-07T16:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/689908ba-radar-tiles-feb-24_cloud-performance-testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-networking-3/</loc>
		<lastmod>2024-03-05T03:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/c24a3b52-radar-tiles-feb-24_cloud-networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-the-value-of-secure-endpoint-management-automation/</loc>
		<lastmod>2024-03-05T21:47:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/a8357b20-cxo-decision-brief-the-value-of-secure-endpoint-management-automation-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-vector-databases/</loc>
		<lastmod>2024-03-06T14:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/68450ba9-radar-tiles-feb-24_vector.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-the-imperative-of-mobile-application-security-platforms/</loc>
		<lastmod>2024-03-06T16:40:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/d409af9b-the-imperative-of-mobile-application-security-platforms-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-unstructured-data-management-udm-solutions/</loc>
		<lastmod>2024-03-06T18:48:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/6919ff8c-kc-tiles-feb-24_udm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-deception-technology-3/</loc>
		<lastmod>2024-03-11T15:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/ffc2c15a-radar-tiles-feb-24_deception.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-observability-solutions/</loc>
		<lastmod>2024-03-07T19:12:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/6c0f8e94-kc-tiles-march-24_cloud-obs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/bc6886e9-fig-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-for-edge-computing-2/</loc>
		<lastmod>2024-03-14T15:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/67702a45-radar-tiles-march-24_kubernetes-for-edge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-kubernetes-for-edge-computing-solutions/</loc>
		<lastmod>2024-03-07T20:41:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/46eb192f-kc-tiles-march-24_kubernetes-for-edge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-firewalls/</loc>
		<lastmod>2024-03-15T15:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/bb869fdf-radar-tiles-march-24_enterprise-firewalls.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-infrastructure-entitlement-management-ciem-solutions/</loc>
		<lastmod>2024-03-08T18:13:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/0e530b1b-kc-tiles-feb-24_ciem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-it-asset-management-itam/</loc>
		<lastmod>2024-03-15T15:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/c77c3d29-radar-tiles-march-24_itam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unstructured-data-management-udm/</loc>
		<lastmod>2024-03-19T15:00:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/01f820c9-radar-tiles-march-24_udm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-infrastructure-entitlement-management-ciem/</loc>
		<lastmod>2024-03-20T15:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/354bc9e1-radar-tiles-march-24_ciem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/data-fabric-field-study/</loc>
		<lastmod>2024-03-13T17:22:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/51df60fe-data-fabric-field-test-sap-vs.-diy-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-e-signature-solutions-3/</loc>
		<lastmod>2024-03-15T19:13:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/35b8f017-radar-tiles-feb-24_e-signature.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/01/2375e2c8-key.peop_.hern_.esignature.230912-1.v3_kc-draft_fig-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-large-enterprises-and-smbs-3/</loc>
		<lastmod>2024-03-26T15:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/81d4b736-radar-tiles-march-24_nos-large-smb.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/e28dacc8-fig-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-csps-and-msps/</loc>
		<lastmod>2024-03-26T15:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/2b63652f-radar-tiles-march-24_nos-c-m.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/4eac4a0c-fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-operating-systems-mnos-and-nsps/</loc>
		<lastmod>2024-03-26T15:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/a935921b-radar-tiles-march-24_nos-mno-nsp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/7c0b2a5c-fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-disaster-recovery-and-business-continuity-as-a-service-dr-bcaas/</loc>
		<lastmod>2024-03-20T19:44:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/501c2c87-radar-tiles-march-24_drbcaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-benchmark-testing-zoom-ai-companion/</loc>
		<lastmod>2024-03-26T16:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/383b4efe-finalbenchmarks-08.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/assessing-microsoft-dev-box-cloud-based-developer-workstations/</loc>
		<lastmod>2024-03-22T23:59:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/12/62bcbc15-again-assessing-microsoft-dev-box-cloud-based-developer-workstations-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-access-governance/</loc>
		<lastmod>2024-03-25T19:40:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/2df39aef-radar-tiles-feb-24_data-access.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-microsegmentation-solutions/</loc>
		<lastmod>2024-03-26T15:22:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/1fe186ad-kc-tiles-march-24_microseg.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-streaming-data-platforms/</loc>
		<lastmod>2024-03-26T16:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/e7c68890-kc-tiles-march-24_streaming.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-zoom-ai-companion-amplifies-meeting-outcomes/</loc>
		<lastmod>2024-03-27T17:16:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/1f833c49-decisionbrief-covers-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-mastering-continuous-testing-with-automation/</loc>
		<lastmod>2024-03-27T17:20:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/9f9c6f5a-decisionbrief-covers-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-extended-detection-and-response-xdr-solutions/</loc>
		<lastmod>2024-04-05T15:26:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/1f27f046-kc-tiles-april-24_xdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-finops-solutions/</loc>
		<lastmod>2024-04-05T21:20:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/9f8be145-kc-tiles-april-24_finops-cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-microsegmentation/</loc>
		<lastmod>2024-04-16T15:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/f101d5f6-radar-tiles-april-24_microsegmentation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-observability-3/</loc>
		<lastmod>2024-04-11T19:46:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/0144d815-radar-tiles-march-24_cloud-observability.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/bf4ab95c-fig-1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-finops-2/</loc>
		<lastmod>2024-04-19T15:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/f83372c3-radar-tiles-april-24_cloud-finops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-attack-surface-management-asm-solutions/</loc>
		<lastmod>2024-04-15T15:47:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/7e8aac48-kc-tiles-jan-24_asm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-security-service-edge-sse-solutions/</loc>
		<lastmod>2024-04-16T19:25:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/cfb4c50a-kc-tiles-april-24_sse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-resource-optimization-solutions/</loc>
		<lastmod>2024-04-16T19:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/963dbb47-kc-tiles-april-24_optimization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-extended-detection-and-response-xdr-2/</loc>
		<lastmod>2024-04-24T15:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/25b9cb6a-radar-tiles-april-24_xdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-security-posture-management-dspm-solutions/</loc>
		<lastmod>2024-04-19T13:21:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/6afb17a3-kc-tiles-april-24_dspm-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-network-observability-solutions/</loc>
		<lastmod>2024-04-24T17:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/726102b5-kc-tiles-april-24_network-observability-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-identity-threat-detection-and-response-itdr-solutions/</loc>
		<lastmod>2024-04-24T17:11:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/761e3117-kc-tiles-april-24_itdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-enhancing-cyber-resilience-with-commvault-cloud-cleanroom-recovery/</loc>
		<lastmod>2024-04-25T13:59:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/4322de3f-enhancing-cyber-resilience-with-commvault-cloud-cleanroom-recovery-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-advancing-data-governance-with-commvault-cloud-cleanroom-recovery/</loc>
		<lastmod>2024-04-25T14:13:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/4cc651da-advancing-data-governance-with-commvault-cloud-cleanroom-recovery-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-harnessing-commvault-cloud-cleanroom-recovery-for-cyber-resilience-and-business-continuity/</loc>
		<lastmod>2024-04-25T14:15:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/60c45b44-harnessing-commvault-cleanroom-recovery-for-cyber-resilience-and-business-continuity-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-elevate-cyber-resilience-with-commvault-cloud-cleanroom-recovery/</loc>
		<lastmod>2024-04-25T14:18:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/eaa78f42-elevate-cyber-resilience-with-commvault-cloud-cleanroom-recovery-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-value-stream-management-vsm-solutions/</loc>
		<lastmod>2024-04-26T17:49:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/7d42a3fc-kc-tiles-april-24_vsm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-pipeline-solutions/</loc>
		<lastmod>2024-04-29T19:55:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/28c384df-kc-tiles-april-24_data-pipeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/de91d135-key.data_.steg_.datapipeline.230934-1.v3_kc-draft_fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/b3ca793d-key.data_.steg_.datapipeline.230934-1.v3_kc-draft_fig-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-resource-optimization-3/</loc>
		<lastmod>2024-05-06T15:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/a5740697-radar-tiles-april-24_cloud-resource-optimization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-service-edge-sse/</loc>
		<lastmod>2024-05-08T15:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/005bdee2-radar-tiles-april-24_sse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/high-volume-data-replication/</loc>
		<lastmod>2024-05-02T23:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/5f841ba2-real-high-volume-data-replication-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-security-posture-management-dspm/</loc>
		<lastmod>2024-05-17T15:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/f0226840-radar-tiles-april-24_dpsm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-value-stream-management-vsm-2/</loc>
		<lastmod>2024-05-13T21:35:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/3fdf7fe4-radar-tiles-april-24_vsm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-streaming-data-platforms-2/</loc>
		<lastmod>2024-05-07T23:44:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/7d1a06c5-radar-tiles-april-24_streaming-data-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-kubernetes-management-for-platform-engineering-teams/</loc>
		<lastmod>2024-05-10T20:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/04/a0a5bee7-kubernetes-management-for-platform-engineering-teams-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-observability-4/</loc>
		<lastmod>2024-05-17T15:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/c3718bbc-radar-tiles-may-24_network-observability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-pipelines-3/</loc>
		<lastmod>2024-05-22T15:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/2b14e86b-radar-tiles-may-24_data-pipelines.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-full-stack-edge-deployment-solutions/</loc>
		<lastmod>2024-05-15T15:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/7fda79ef-kc-tiles-april-24_fullstack-deployment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-network-detection-and-response-ndr-solutions/</loc>
		<lastmod>2024-05-20T14:25:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/48ab8bf1-kc-tiles-may-24_ndr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-identity-threat-detection-and-response-itdr/</loc>
		<lastmod>2024-05-27T15:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/954e87a6-radar-tiles-may-24_itdr.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-agile-planning-and-portfolio-management-ppm-solutions/</loc>
		<lastmod>2024-05-22T18:06:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/68dd3a8a-kc-tiles-may-24_agile-ppm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-enterprise-object-storage-solutions/</loc>
		<lastmod>2024-05-22T18:13:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/a30494da-kc-tiles-may-24_object.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-saas-management-platforms-smps/</loc>
		<lastmod>2024-05-22T18:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/3912885f-kc-tiles-may-24_smps.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/54b0bc29-key.clou_.jall_.saasmgt.230965-1.v3_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-benchmark-achieving-cyber-resilience-with-commvault-cleanroom-recovery/</loc>
		<lastmod>2024-05-31T19:33:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/73ed0f07-achieving-cyber-resilience-with-commvault-cleanroom-recovery-20-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-saas-management-platforms-smps-2/</loc>
		<lastmod>2024-06-07T15:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/af038f68-radar-tiles-may-24_smps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-full-stack-edge-deployments/</loc>
		<lastmod>2024-05-31T19:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/68d3480f-radar-tiles-may-24_full-stack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-object-storage-5/</loc>
		<lastmod>2024-06-07T15:00:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/ebf5bf68-radar-tiles-may-24_enterprise-object-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-second-draft-mobile-threat-defense-mtd/</loc>
		<lastmod>2024-06-03T15:44:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/350ba6c1-mobile-threat-defense-mtd-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-gitops-3/</loc>
		<lastmod>2024-06-10T17:44:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/03/f52a6723-radar-tiles-march-24_gitops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-intelligent-fraud-detection-in-financial-transactions/</loc>
		<lastmod>2024-06-10T17:44:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/03/2290639c-radar-tile-4-intelligent-fraud-detection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-governance-risk-and-compliance-solutions/</loc>
		<lastmod>2024-06-10T17:44:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/02/1250fb5f-radar-tile-01-23_grc-v1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-ai-processors-low-power-edition/</loc>
		<lastmod>2024-06-10T17:57:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/01/b77c6974-radar-tile_edge-ai.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-edge-orchestration-platforms/</loc>
		<lastmod>2024-06-10T20:13:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/0c4780de-kc-tiles-april-24_edge-orchestration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-enterprise-password-management-solutions/</loc>
		<lastmod>2024-06-10T20:19:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/faa8c143-kc-tiles-june-24_password-mgmt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-operational-technology-ot-security-solutions/</loc>
		<lastmod>2024-06-10T20:23:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/8878b853-kc-tiles-april-24_ots.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-operational-technology-ot-security-2/</loc>
		<lastmod>2024-06-24T15:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/0dbf82a5-radar-tiles-june-24_ot-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-development-platforms/</loc>
		<lastmod>2024-06-25T15:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/0d475897-radar-tiles-june-24_edge-development-platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-kubernetes-data-storage-solutions/</loc>
		<lastmod>2024-06-18T14:08:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/e244b0fb-kc-tiles-june-24_k8-data-storage.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/edd9e123-key.stor_.pisc_.k8datastorage.240983-1.v5_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-zero-trust-network-access-ztna-solutions/</loc>
		<lastmod>2024-06-19T16:15:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/c6537630-kc-tiles-may-24_ztna.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-edge-development-platforms/</loc>
		<lastmod>2024-06-19T16:22:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/8d04d9d5-kc-tiles-may-24_edgedev.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-password-management/</loc>
		<lastmod>2024-07-02T15:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/ac2a0a23-radar-tiles-june-24_enterprise-password.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-saas-security-posture-management-sspm-solutions/</loc>
		<lastmod>2024-06-25T20:06:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/ce60047a-kc-tiles-june-24_sspm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-hybrid-cloud-data-protection-solutions/</loc>
		<lastmod>2024-06-25T20:08:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/d8a69933-kc-tiles-june-24_hybrid-cloud-dp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-digital-experience-platforms-dxps/</loc>
		<lastmod>2024-06-27T14:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/d4eb8323-kc-tiles-june-24_dxps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-unified-communications-as-a-service-ucaas-solutions/</loc>
		<lastmod>2024-06-27T16:37:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/c39200bf-kc-tiles-june-24_ucaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-access-security-broker-casb-solutions/</loc>
		<lastmod>2024-06-28T13:40:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/e01b9f6a-kc-tiles-june-24_casb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-anti-phishing-solutions/</loc>
		<lastmod>2024-06-28T13:48:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/8b3de66d-kc-tiles-june-24_anti-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-security-policy-as-code-solutions/</loc>
		<lastmod>2024-06-28T13:52:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/813f8daa-kc-tiles-june-24_policy-as-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-service-mesh-solutions/</loc>
		<lastmod>2024-07-02T13:06:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/9671ed78-kc-tiles-june-24_service-mesh.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-real-time-data-processing-and-analytics/</loc>
		<lastmod>2024-07-02T16:31:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/5e08c4e6-real-time-data-processing-and-analytics-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-data-storage/</loc>
		<lastmod>2024-07-12T15:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/fb8ab7b2-radar-tiles-june-24_kubernetes-data-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-edge-orchestration-platforms/</loc>
		<lastmod>2024-07-12T15:00:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/9d27a0a6-radar-tiles-june-24_edge-orchestration-platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-ddi-solutions/</loc>
		<lastmod>2024-07-02T20:02:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/bf5eee99-kc-tiles-june-24_ddi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/621da6a3-key.netw_.mcph_.ddidns-dhcp-ipam.241015-1.v3_kc-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-detection-and-response-ndr-2/</loc>
		<lastmod>2024-07-17T15:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/20d1fa47-radar-tiles-july-24_network-detection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-it-service-management-itsm-solutions/</loc>
		<lastmod>2024-07-15T17:15:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/b0e88a84-kc-tiles-june-24_itsm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-security-information-and-event-management-siem-solutions/</loc>
		<lastmod>2024-07-15T19:03:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/01b8fa54-kc-tiles-july-24_siem-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-modernizing-your-vm-environment-by-leveraging-diamanti-and-kubevirt/</loc>
		<lastmod>2024-07-18T20:01:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/435e4b75-modernizing-your-vm-environment-by-leveraging-diamanti-and-kubevirt-03.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-continuous-vulnerability-management-cvm-solutions/</loc>
		<lastmod>2024-07-23T16:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/a554d074-kc-tiles-july-24_cvm-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-agile-planning-and-portfolio-management-ppm-solutions/</loc>
		<lastmod>2024-07-23T19:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/05/fa4118c9-radar-tiles-may-24_agile.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-observability-solutions/</loc>
		<lastmod>2024-07-23T19:50:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/b982fadb-kc-tiles-july-24_data-observability-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/finops-insights-and-management-from-spot-by-netapp/</loc>
		<lastmod>2024-07-26T15:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/6c2f210f-finops-insights-and-management-from-spot-by-netapp-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unified-communications-as-a-service-ucaas-3/</loc>
		<lastmod>2024-08-06T15:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/d66d294c-radar-tiles-july-24_unified-communications-as-a-service-ucaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-anti-phishing-2/</loc>
		<lastmod>2024-07-30T20:06:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/291b5a49-radar-tiles-july-24_anti-phishing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-information-and-event-management-siem-2/</loc>
		<lastmod>2024-07-30T20:07:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/310243b6-radar-tiles-july-24_security-information-event-management-siem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-access-security-broker-casb/</loc>
		<lastmod>2024-08-07T15:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/89f0b483-radar-tiles-july-24_cloud-access-security-broker-casb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-policy-as-code-2/</loc>
		<lastmod>2024-08-07T15:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/0ad9f2e6-radar-tiles-july-24_security-polcy-as-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-zero-trust-network-access-ztna-3/</loc>
		<lastmod>2024-07-31T16:14:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/aa639baa-radar-tiles-june-24_ztna.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-cloud-native-data-protection/</loc>
		<lastmod>2024-08-07T15:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/680b702a-sonar-tile_cloud-native-data-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-service-mesh-3/</loc>
		<lastmod>2024-08-09T15:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/6de141a7-radar-tiles-july-24_service-mesh.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/9990cad9-figure-1.-service-mesh-projects-and-vendors.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-it-service-management-itsm-2/</loc>
		<lastmod>2024-08-02T18:30:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/eb4ad9db-radar-tiles-july-24_t-service-management-itsm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-observability-2/</loc>
		<lastmod>2024-08-15T15:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/ab0f40a8-radar-tiles-august-24_data-observability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-saas-security-posture-management-sspm/</loc>
		<lastmod>2024-08-15T15:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/cf6fefa1-radar-tiles-august-24_sspm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-secure-enterprise-browsing/</loc>
		<lastmod>2024-08-22T15:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/1410480f-radar-tiles-august-24_secure-enterprise-browsing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-offensive-security-testing-and-pentest-as-a-service/</loc>
		<lastmod>2024-08-16T15:02:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/5d659813-offensive-security-testing-and-pentest-as-a-service-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-report-for-real-time-analytical-databases/</loc>
		<lastmod>2024-08-16T16:46:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/481ac763-sonar-tile_real-time-analytical-databases.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-api-security-solutions/</loc>
		<lastmod>2024-08-16T17:02:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/595d6475-kc-tiles-july-24_api-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-software-defined-wide-area-network-sd-wan-solutions-2/</loc>
		<lastmod>2024-08-16T17:18:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/856c87e1-kc-tiles-august-24_sd-wan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-loss-prevention-dlp-solutions/</loc>
		<lastmod>2024-08-16T19:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/95533506-kc-tiles-august-24_dlp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-secure-enterprise-browsing-solutions/</loc>
		<lastmod>2024-08-16T19:40:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/94da9414-kc-tiles-august-24_secure-enterprise-browsing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-secure-mobility-with-t-mobile-5g/</loc>
		<lastmod>2024-08-26T22:58:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/5cd5b139-secure-mobility-with-t-mobile-5g-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/5g-for-connected-workers-transforming-remote-work/</loc>
		<lastmod>2024-08-26T22:58:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/081fecee-understanding-5g-cover-art-20.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/crowdstrike-falcon-logscale-benchmark-report/</loc>
		<lastmod>2024-08-27T19:13:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/11/55fb17c8-finalbenchmarks-28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-survey-report-delivering-application-performance-in-a-hybrid-world/</loc>
		<lastmod>2024-08-28T19:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/377511cf-survey-report-solarwinds-cover-art.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-hybrid-cloud-data-protection-2/</loc>
		<lastmod>2024-09-11T15:00:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/7783d983-radar-tiles-august-24_hybrid-cloud-data-protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-loss-prevention-dlp-2/</loc>
		<lastmod>2024-09-11T15:00:07+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/571cbd4b-radar-tiles-august-24_dlp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ddi-dns-dhcp-and-ipam/</loc>
		<lastmod>2024-09-12T15:00:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/bdf577ea-radar-tiles-august-24_ddi.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/4e1be0d8-figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-security-orchestration-automation-and-response-soar-solutions/</loc>
		<lastmod>2024-09-10T19:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/1602061f-kc-tiles-september-24_soar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-semantic-layers-and-metrics-stores/</loc>
		<lastmod>2024-09-19T15:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/21a1adb4-sonar-tile-template-2024_semantic-layers-and-metrics-stores.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-e-discovery-solutions/</loc>
		<lastmod>2024-09-18T16:49:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/1a82f298-kc-tiles-september-24_e-disc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-aiops-solutions/</loc>
		<lastmod>2024-09-19T13:43:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/7eed1fc0-kc-tiles-july-24v2_aiops.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-solution-profile-cogility-tacitred/</loc>
		<lastmod>2024-09-23T15:30:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/28fe92df-rep.temp_.holt_.cogility_sbpasm.241008-3_cover-art.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-intelligent-document-processing-idp-solutions/</loc>
		<lastmod>2024-09-27T14:37:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/608fd69b-kc-tiles-september-24_idp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-catalog-solutions/</loc>
		<lastmod>2024-09-27T14:55:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/6c10b82f-kc-tiles-sept-24_data-catalog-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-continuous-vulnerability-management-cvm/</loc>
		<lastmod>2024-09-27T15:04:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/8320f9fd-radar-tiles_continuous-vulnerability-management-cvm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-solution-brief-greymatter-io/</loc>
		<lastmod>2024-10-07T18:29:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/37d720de-greymattersolutionbrief-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-e-discovery-3/</loc>
		<lastmod>2024-10-14T15:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/cc04a0db-rad.peop_.clar_.ediscovery.241049.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-aiops-3/</loc>
		<lastmod>2024-10-08T15:00:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/e6bdfa02-large-radar-tiles_aiops.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/9802c21b-fig.1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-enhancing-observability-and-workforce-efficiency/</loc>
		<lastmod>2024-10-07T20:24:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/7a3930f1-enhancing-observability-and-workforce-efficiency-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-navigating-the-siem-market-transition/</loc>
		<lastmod>2024-10-08T14:50:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/64d35219-navigating-the-siem-market-transition-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-application-security-testing-ast-solutions/</loc>
		<lastmod>2024-10-08T17:03:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/f85e11a5-kc-tiles-july-24_ast-solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-intelligent-document-processing-idp-2/</loc>
		<lastmod>2024-10-18T15:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/cef2f59c-radar-tiles_idp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-native-globally-distributed-file-systems/</loc>
		<lastmod>2024-10-18T15:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/d6618f43-radar-tiles_cnfs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-catalogs-4/</loc>
		<lastmod>2024-10-22T15:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/b9b54843-radar-tiles_data-catalogs-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-autonomous-security-operations-center-soc-solutions/</loc>
		<lastmod>2024-10-25T15:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/d8bfd559-radar-tiles_soc-solutions-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-ai-governance/</loc>
		<lastmod>2024-10-23T21:41:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/25ae0b01-sonar-tile-template-2024_ai-governance.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/87cea85d-son.data_.brus_.aigovernance.241014-1.v1_sonar-draft_fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-maturity-model-internet-performance-monitoring-ipm/</loc>
		<lastmod>2024-10-31T15:00:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/8700621d-catchpoint-maturity-model-cover-art.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-security-testing-ast/</loc>
		<lastmod>2024-10-31T19:49:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/196362a9-radar-tiles_application-security-testing-ast.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-api-security-3/</loc>
		<lastmod>2024-11-01T19:07:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/b998a128-radar-tiles_api-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-digital-experience-platforms-dxps-2/</loc>
		<lastmod>2024-11-04T15:57:40+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/c205e770-radar-tiles-july-24_digital-experience-platforms-dxps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-native-application-protection-platforms-cnapps/</loc>
		<lastmod>2024-11-04T17:24:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/fb76eb54-kc-tiles-september-24_cnapp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-native-globally-distributed-file-system-solutions/</loc>
		<lastmod>2024-11-04T18:00:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/89902cc5-kc-tiles-24_cloud-native.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-native-application-protection-platforms-cnapps/</loc>
		<lastmod>2024-11-04T21:47:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/740b158d-radar-tiles_cnapps-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-kubernetes-observability-solutions/</loc>
		<lastmod>2024-11-05T20:45:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/b0b14a8a-kc-tiles-august-24_k8-obs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-solution-brief-cogility/</loc>
		<lastmod>2024-11-06T18:43:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/06/45452458-image.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-managed-security-service-providers-mssp/</loc>
		<lastmod>2024-11-06T18:45:06+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/d9490e90-mssp-otava-04.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-patch-management-2/</loc>
		<lastmod>2024-11-19T16:00:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/6c4e11f9-radar-tiles_patch-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-network-security-solutions/</loc>
		<lastmod>2024-11-15T21:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/5efa7943-kc-tiles-24_cloud-network-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-network-security-2/</loc>
		<lastmod>2024-11-21T16:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/044ceaa7-radar-tiles_cloud-network-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-observability/</loc>
		<lastmod>2024-11-18T22:23:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/840f5d5e-radar-tiles_kubernetes-observability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-management-platforms-cmps-2/</loc>
		<lastmod>2024-11-18T22:35:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/2275bd18-radar-tiles_cmp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-agile-planning-and-portfolio-management-ppm/</loc>
		<lastmod>2024-11-20T04:39:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/05/6efd7a01-client-radar-may-tile-l_agile-planning-and-portfolio-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-domain-name-system-dns-security/</loc>
		<lastmod>2024-11-20T19:22:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/02/6a6319d1-radar-tiles-feb-24_dns-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-penetration-testing-as-a-service-ptaas-2/</loc>
		<lastmod>2024-11-20T22:03:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/c7c1cbe7-radar-tiles_ptaas-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-software-supply-chain-security/</loc>
		<lastmod>2024-11-22T16:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/a404bae4-radar-tiles_sscs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/sql-transaction-processing-and-analytic-performance-price-performance-testing-2/</loc>
		<lastmod>2024-11-25T17:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2022/12/f7844d56-finalbenchmarks-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-performance-management-apm-2/</loc>
		<lastmod>2024-12-05T16:00:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/7d6c13d1-radar-tiles_apm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/dc829c8d-kcr.clou_.eric_.apm_.2401047.v3_fig-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-process-automation-epa-solutions/</loc>
		<lastmod>2024-12-06T16:00:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/ee7bac99-radar-tiles_epa.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-security-orchestration-automation-and-response-soar-3/</loc>
		<lastmod>2024-12-05T01:20:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/36e70da9-radar-tiles_soar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-ransomware-prevention-2/</loc>
		<lastmod>2024-12-05T16:15:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/82c70315-radar-tiles_ransomware-prevention.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-container-security-3/</loc>
		<lastmod>2024-12-10T16:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/761178aa-radar-tiles_container-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/new-microsoft-teams-performance-benchmark/</loc>
		<lastmod>2024-12-09T22:17:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/e7c0774a-new-microsoft-teams-performance-benchmark-28.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/03/2ffa0d29-microsoftteamscharts-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-as-a-service-solutions/</loc>
		<lastmod>2024-12-12T16:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/8631b4df-radar-tiles_naas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-primary-storage/</loc>
		<lastmod>2024-12-13T16:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/483538b3-radar-tiles_primary-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-saas-business-intelligence-platforms/</loc>
		<lastmod>2024-12-10T17:02:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/fa47224b-decisionbrief-saas-02.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-container-networking/</loc>
		<lastmod>2024-12-13T16:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_Container-Networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-data-protection-5/</loc>
		<lastmod>2024-12-13T16:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_Kubernetes-Data-Protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-vector-databases-2/</loc>
		<lastmod>2024-12-13T16:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Sonar-Tile-Template-2024_Vector-Databases.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-scale-out-storage/</loc>
		<lastmod>2024-12-11T19:23:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/6ea13f3b-radar-tiles_scale-out-storage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-data-processing-units-dpus/</loc>
		<lastmod>2024-12-13T16:00:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Sonar-Tile-Template-2024_Data-Processing-Unit-DPU.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-application-api-security/</loc>
		<lastmod>2024-12-13T16:00:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_Application-API-Security-AAS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-validation-3/</loc>
		<lastmod>2024-12-13T16:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_Network-Validation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-key-criteria-and-radar-for-api-functional-automated-testing-solutions/</loc>
		<lastmod>2024-12-13T16:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_API-Functional-Automated-Testing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-scale-out-storage-solutions/</loc>
		<lastmod>2024-12-16T14:08:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/a450b400-kc-tiles-24_scale-out-storage-solutions-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/procurement-efficiency-with-the-microsoft-commercial-marketplace/</loc>
		<lastmod>2024-12-16T15:45:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/412a1cf6-finalbenchmarks-26.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/transaction-processing-price-performance-testing/</loc>
		<lastmod>2024-12-16T16:43:29+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/04/3afc57a3-finalbenchmarks-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-ptaas-solutions/</loc>
		<lastmod>2024-12-16T18:05:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/65aea1ac-kc-tiles-24_ptaas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-software-supply-chain-security-sscs-solutions/</loc>
		<lastmod>2024-12-16T18:13:37+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/8fdc265f-kc-tiles-24_sscs-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-ransomware-prevention-solutions/</loc>
		<lastmod>2024-12-16T18:17:26+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/fe1a3e91-kc-tiles-24_ransomware-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/sql-transaction-processing-and-analytic-performance-price-performance-testing-3/</loc>
		<lastmod>2024-12-17T15:30:17+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/03/a7d5b3ae-sql-transaction-processing-and-analytic-performance-price-performance-testing-cover-10.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-management-platform-cmps-solutions/</loc>
		<lastmod>2024-12-17T21:25:39+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/b4595db0-kc-tiles-24_cmp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/d11fc8ae-key.clou_.hern_.cmp_.230845-1.v2_kc-draft_figure-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-warehouse-solutions/</loc>
		<lastmod>2024-12-19T17:21:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/2f01952e-kc-tiles-24_data-warehouse-solutions-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-primary-storage-solutions-2/</loc>
		<lastmod>2024-12-19T18:31:05+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/ec8aa3b2-kc-tiles-24_primary-storage-solutions-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-secure-access-service-edge-sase-solutions-2/</loc>
		<lastmod>2024-12-19T18:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-24_SASE.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-autonomous-security-operations-center-soc-solutions/</loc>
		<lastmod>2024-12-19T18:33:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/8a3907f2-kc-tiles-24_soc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-application-performance-management-apm-solutions/</loc>
		<lastmod>2024-12-19T18:33:11+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/12caac83-kc-tiles-24_apm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-container-security-solutions/</loc>
		<lastmod>2024-12-23T15:28:49+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-September-24_Container.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-container-networking-solutions/</loc>
		<lastmod>2024-12-23T16:35:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-24_Container-Networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-network-validation-solutions/</loc>
		<lastmod>2025-01-02T17:26:28+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-24_Network-Validation-Solutions-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Source-file_Fig-1-and-3_key.netw_.Mcph_.NetworkValidation.241095-1.v3_Fig-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-unified-endpoint-management-uem-solutions-2/</loc>
		<lastmod>2025-01-03T20:27:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-24_UEM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-workload-security-cws-solutions-2/</loc>
		<lastmod>2025-01-03T21:26:00+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-24_Cloud-Workload-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-network-as-a-service-solutions/</loc>
		<lastmod>2025-01-06T14:33:18+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-24_NaaS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-enterprise-process-automation-epa-solutions-2/</loc>
		<lastmod>2025-01-08T18:10:15+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-24_EPA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-managed-kubernetes-3/</loc>
		<lastmod>2025-01-15T16:00:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_Managed-Kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-workload-security/</loc>
		<lastmod>2025-01-15T16:00:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_Cloud-Workload-Security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-insider-risk-management/</loc>
		<lastmod>2025-01-13T17:43:41+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/10/eb717676-radar-tiles_insider-risk-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-security-platforms/</loc>
		<lastmod>2025-01-15T19:51:13+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_Data-Security-Platform.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-security-platform-dsp-solutions/</loc>
		<lastmod>2025-01-22T17:26:14+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-24_Data-Security-Platform.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-application-and-api-security-solutions/</loc>
		<lastmod>2025-01-22T17:34:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-24_Application-and-API-Security-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-kubernetes-data-protection-solutions-2/</loc>
		<lastmod>2025-01-22T18:10:48+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-24_K8-Data-Protection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-managed-kubernetes-solutions-2/</loc>
		<lastmod>2025-01-22T19:37:45+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-24_Managed-Kubernetes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-insider-risk-management-solutions/</loc>
		<lastmod>2025-01-22T21:39:21+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-24_Insider-Risk-Management-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-center-switching-solutions-2/</loc>
		<lastmod>2025-02-04T16:00:31+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-25_Data-Center-Switching-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-center-switching-4/</loc>
		<lastmod>2025-02-04T16:00:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/Radar-Tiles-2025_Data-Center-Switching.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-secure-access-service-edge-sase-2/</loc>
		<lastmod>2025-02-04T16:06:27+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/Radar-Tiles_SASE.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unified-endpoint-management-uem-solutions/</loc>
		<lastmod>2025-02-11T16:00:52+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Radar-Tiles-2025_UEM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-contact-center-as-a-service-ccaas-solutions/</loc>
		<lastmod>2025-02-12T16:00:58+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Radar-Tiles-2025_CCaaS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-infrastructure-entitlement-management-ciem-solutions/</loc>
		<lastmod>2025-02-12T16:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Radar-Tiles-2025_CIEM-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-software-asset-management-sam/</loc>
		<lastmod>2025-02-13T16:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Radar-Tiles-2025_SAM-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-software-asset-management-sam-solutions/</loc>
		<lastmod>2025-02-11T20:52:46+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-25_SAMs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-disaggregated-network-operating-systems-dnos/</loc>
		<lastmod>2025-02-11T20:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/KC-Tiles-25_dNOS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-cloud-infrastructure-entitlement-management-ciem-solutions-2/</loc>
		<lastmod>2025-02-11T21:27:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-25_CIEM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-attack-surface-management-asm-solutions-2/</loc>
		<lastmod>2025-02-11T21:49:55+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-24_ASM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-data-access-governance-solutions-2/</loc>
		<lastmod>2025-02-12T00:14:12+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/KC-Tiles-24_Data-Access-Governance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-api-functional-automated-testing-solutions-2/</loc>
		<lastmod>2025-02-12T00:18:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/KC-Tiles-25_API-Functional-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-patch-management-solutions/</loc>
		<lastmod>2025-02-12T16:30:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/09/91bc0bcd-kc-tiles-august-24_patch-management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-solution-brief-grokstream/</loc>
		<lastmod>2025-02-18T16:10:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Grok-AIOps-SolutionBrief.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-sap-build/</loc>
		<lastmod>2025-02-19T17:46:20+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/SAP-Build-06.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-benchmark-report-sap-build-vs-custom-development/</loc>
		<lastmod>2025-02-19T17:53:16+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/93aeb6c6-finalbenchmarks-28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-attack-surface-management-3/</loc>
		<lastmod>2025-02-24T16:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Radar-Tiles-2025_ASM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-solution-brief-ericsson/</loc>
		<lastmod>2025-02-20T14:32:43+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/ZTNA-SolutionBrief.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-evaluating-disaggregated-network-operating-systems-dnos-2/</loc>
		<lastmod>2025-02-28T16:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Radar-Tiles-2025_DNOS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-gitops-solutions/</loc>
		<lastmod>2025-02-28T16:00:19+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Radar-Tiles-2025_GitOps-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-warehouses-4/</loc>
		<lastmod>2025-02-26T15:58:09+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/11/311b45e8-radar-tiles_data-warehouse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-access-governance-4/</loc>
		<lastmod>2025-03-10T15:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Data-Access-Governance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-by-the-numbers-survey-of-primary-cloud-providers/</loc>
		<lastmod>2025-03-11T15:00:38+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/02/Survey-ByTheNumbers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-object-storage-as-a-service/</loc>
		<lastmod>2025-03-11T15:00:22+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Object-Storage-as-a-Service.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-sonar-for-storage-as-a-service/</loc>
		<lastmod>2025-03-12T15:00:57+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Sonar-Tile-Template-2025_STAAS.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-finops-3/</loc>
		<lastmod>2025-03-13T15:00:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Cloud-FinOps-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-benchmark-new-teams-optimization-for-virtual-desktop-infrastructure-vdi/</loc>
		<lastmod>2025-03-10T19:53:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/01/FinalBenchmarks-28.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/cxo-decision-brief-windows-server-datacenter-azure-edition/</loc>
		<lastmod>2025-03-10T19:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/08/c49e2a8d-windows-server-datacenter-azure-edition-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-benchmark-migrating-windows-server-workloads-to-azure/</loc>
		<lastmod>2025-03-11T14:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/07/6c0b6a6f-finalbenchmarks-05.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-it-asset-management-itam-2/</loc>
		<lastmod>2025-03-14T15:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_-IT-Asset-Management-ITAM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-networking-4/</loc>
		<lastmod>2025-03-14T15:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Cloud-Networking.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-unstructured-data-management-2/</loc>
		<lastmod>2025-03-17T15:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_UDM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-resource-management-2/</loc>
		<lastmod>2025-03-18T15:00:47+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Kubernetes-Resource-Management.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-observability-4/</loc>
		<lastmod>2025-03-18T15:00:44+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Cloud-Observability-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-identity-and-access-management/</loc>
		<lastmod>2025-03-18T15:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_IAM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-software-defined-wide-area-network-sd-wan-solutions/</loc>
		<lastmod>2025-03-14T15:07:42+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2024/12/fd8fc31a-radar-tiles_sd-wan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-kubernetes-for-edge-computing-3/</loc>
		<lastmod>2025-03-14T17:01:56+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Kubernetes-for-Edge-Computing.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-key-criteria-for-evaluating-deception-technology-solutions-2/</loc>
		<lastmod>2025-03-20T15:00:02+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/KC-Tiles-25_Deception-Technology-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-cloud-resource-optimization-4/</loc>
		<lastmod>2025-03-24T15:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Cloud-Resource-Optimization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-enterprise-firewalls-2/</loc>
		<lastmod>2025-03-19T18:33:51+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Enterprise-Firewalls.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-lakes-and-lakehouses-3/</loc>
		<lastmod>2025-03-26T15:00:34+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Data-Lakes-and-Lakehouses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-deception-technology-4/</loc>
		<lastmod>2025-03-21T17:24:33+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Deception-Technology.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/high-performance-cloud-data-warehouse-testing/</loc>
		<lastmod>2025-03-24T16:03:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2023/07/9b37a38a-finalbenchmarks-cloiud-data-testing-03.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://research.s.gigaom.com/wp-content/uploads/sites/1/2023/07/0321cdd7-ben.dole_.actian-benchmark-23.781-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-it-incident-response-platforms-irp/</loc>
		<lastmod>2025-03-28T15:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_Incident-Response-Platforms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-data-security-posture-management-dspm-2/</loc>
		<lastmod>2025-03-26T15:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/03/Radar-Tiles-2025_DSPM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://s.gigaom.com/report/gigaom-radar-for-network-observability-5/</loc>
		<lastmod>2025-05-28T14:56:53+00:00</lastmod>
		<image:image>
			<image:loc>https://s.gigaom.com/wp-content/uploads/sites/1/2025/05/Radar_Tiles_2025_Network_Observa.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->