<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.amplifiersecurity.com/</loc></url>
<url><loc>https://www.amplifiersecurity.com/jamf-compliance-benchmarks-offer</loc></url>
<url><loc>https://www.amplifiersecurity.com/product</loc></url>
<url><loc>https://www.amplifiersecurity.com/solutions</loc></url>
<url><loc>https://www.amplifiersecurity.com/roi-calculator</loc></url>
<url><loc>https://www.amplifiersecurity.com/company</loc></url>
<url><loc>https://www.amplifiersecurity.com/platform</loc></url>
<url><loc>https://www.amplifiersecurity.com/book-a-demo</loc></url>
<url><loc>https://www.amplifiersecurity.com/free-human-risk-assessment</loc></url>
<url><loc>https://www.amplifiersecurity.com/free-cybersecurity-compliance-training-videos</loc></url>
<url><loc>https://www.amplifiersecurity.com/contact-us</loc></url>
<url><loc>https://www.amplifiersecurity.com/tos</loc></url>
<url><loc>https://www.amplifiersecurity.com/privacy</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog</loc></url>
<url><loc>https://www.amplifiersecurity.com/integrations</loc></url>
<url><loc>https://www.amplifiersecurity.com/integrations/okta</loc></url>
<url><loc>https://www.amplifiersecurity.com/integrations/jamf</loc></url>
<url><loc>https://www.amplifiersecurity.com/integrations/crowdstrike</loc></url>
<url><loc>https://www.amplifiersecurity.com/integrations/automox</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos</loc></url>
<url><loc>https://www.amplifiersecurity.com/news</loc></url>
<url><loc>https://www.amplifiersecurity.com/demos</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/announcing-safe-ai-usage-put-ai-policy-into-workforce-practice</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/the-phantom-workforce-how-shadow-ai-and-unauthorized-gen-ai-tools-spread-(and-how-to-regain-control)</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/behavior-based-employee-risk-scores-muddle-human-risk-management</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/amplifier-ai-security-coaching-free-compliance-training</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/why-human-risk-management-has-a-first-mile-problem</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/closing-endpoint-vulnerabilities-with-ai-and-employee-engagements</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/beyond-the-static-turning-the-noise-of-human-risk-into-action</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/evolving-from-managing-to-mitigating-human-risk</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/filling-the-gap-in-human-risk-mitigation</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/what-is-autonomous-user-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/human-in-the-loop-automation-the-key-to-mitigating-human-risk</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/what-is-a-cve-and-how-should-you-prioritize-patch-management</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/how-to-overcome-the-last-mile-problem-of-human-risk</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/user-friendly-automation-for-jamf-smart-group-compliance</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/four-modern-human-security-trends-we-learned-at-black-hat-bsides-2024</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/human-centric-security-means-coaching-instead-of-diagnosing</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/identifying-untapped-potential-in-your-weakest-link</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/human-centric-security-self-healing-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/what-is-self-healing-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/what-is-human-centric-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/blog/sound-check</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/amplifier-launches-agentic-platform-to-operationalize-human-risk-management</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/amplifier-featured-in-the-keynote-of-jamf-customer-conference-jnuc-25</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/amplifier-security-emerges-from-stealth-to-bridge-divide-between-the-workforce-and-security-with-ai-and-human-in-the-loop-automation</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/amplifier-security-raises-5-6m-to-power-autonomous-user-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/amplifier-security-and-jamf-partner-to-automate-mac-compliance-with-ai-powered-user-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/the-future-of-human-security-is-autonomous</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/introducing-amplifier-self-healing-workforce-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/news/how-human-centric-and-self-healing-security-closes-the-great-gap-in-cybersecurity</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-featured-in-the-keynote-of-jamf-customer-conference-jnuc-25</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/how-oscar-health-accelerated-mac-compliance-using-ai-user-engagements-with-jamf-amplifier-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-frequency-live-music-city-fall-2024</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-frequency-live-atlanta-fall-2024</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-frequency-live-nyc-spring-2024</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-frequency-live-san-francisco-spring-2024</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-aftab-banth-tiktok-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-nick-vigier-oscar-health-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-mosi-platt-netflix-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-michael-shannon-guardant-health-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-shawn-bass-ex-vmware-end-user-computing-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/nitin-raina-ciso-thoughtworks-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-bryan-blaustein-c%C3%B8mpass-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-johan-dowdy-asana-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-shawn-carney-ex-etsy-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-dave-lavelle-instabase-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-guillermo-porcaro-medallia-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-derrick-diaz-pinterest-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/thomas-donnelly-co-founder-cto-amplifier-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/shreyas-sadalgi-co-founder-ceo-amplifier-security</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/amplifier-security-seed-fundraise-announcement-video</loc></url>
<url><loc>https://www.amplifiersecurity.com/videos/how-it-works</loc></url>
</urlset>