<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 10:30 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.insoftconsultancy.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title></title>
		<link><![CDATA[https://www.insoftconsultancy.com]]></link>
		<lastBuildDate><![CDATA[Wed, 27 Aug 2025 09:50:51 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.insoftconsultancy.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/palo-alto/next-generation-firewalls-ngfws/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/palo-alto/next-generation-firewalls-ngfws/]]></link>
			<title>Next-Generation Firewalls (NGFWs)</title>
			<pubDate><![CDATA[Wed, 27 Aug 2025 09:50:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/palo-alto/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/palo-alto/]]></link>
			<title>Palo Alto</title>
			<pubDate><![CDATA[Wed, 27 Aug 2025 09:49:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/palo-alto-consultancy-services/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/palo-alto-consultancy-services/]]></link>
			<title>Palo Alto Consultancy Services</title>
			<pubDate><![CDATA[Wed, 27 Aug 2025 09:15:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/network-transformation-and-technology-trends-for-2020/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/network-transformation-and-technology-trends-for-2020/]]></link>
			<title>Network Transformation and Technology Trends for 2020</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/lets-explore-cloud-native-networks-and-devops/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/lets-explore-cloud-native-networks-and-devops/]]></link>
			<title>Let’s Explore Cloud-Native Networks and DevOps</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/how-does-the-ai-make-smart-cities-smarter/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/how-does-the-ai-make-smart-cities-smarter/]]></link>
			<title>How Does The AI Make Smart Cities Smarter</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/data-formats-and-models/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/data-formats-and-models/]]></link>
			<title>Data Formats and Models</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/fortigate-rest-api-token-authentication/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/fortigate-rest-api-token-authentication/]]></link>
			<title>FortiGate REST API Token Authentication</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/the-fast-rising-threats-in-automotive-cyber-security/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/the-fast-rising-threats-in-automotive-cyber-security/]]></link>
			<title>The Fast-Rising Threats in Automotive Cyber Security</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/digital-transformation-trends-how-they-impact-your-business/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/digital-transformation-trends-how-they-impact-your-business/]]></link>
			<title>Digital Transformation Trends: How they Impact your Business?</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/deploying-network-automation-in-your-infrastructure/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/deploying-network-automation-in-your-infrastructure/]]></link>
			<title>Deploying Network Automation in your Infrastructure</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/boosting-companys-productivity-through-cloud-computing/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/boosting-companys-productivity-through-cloud-computing/]]></link>
			<title>Boosting Company’s Productivity through Cloud Computing</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/interpretation-of-enterprise-security-architecture/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/interpretation-of-enterprise-security-architecture/]]></link>
			<title>Interpretation of Enterprise Security Architecture</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/what-is-cloud-computing-and-how-does-it-work/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/what-is-cloud-computing-and-how-does-it-work/]]></link>
			<title>What is Cloud Computing and How does it work?</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/introduction-to-cybersecurity-advisory-and-consulting/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/introduction-to-cybersecurity-advisory-and-consulting/]]></link>
			<title>Introduction to Cybersecurity Advisory and Consulting</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/software-defined-network-access-control-requirements-part-1/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/software-defined-network-access-control-requirements-part-1/]]></link>
			<title>Software-Defined Network Access Control Requirements Part 1</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/fortisdwan-introduction/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/fortisdwan-introduction/]]></link>
			<title>FortiSDWAN Introduction</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/cybersecurity-trends-in-2019/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/cybersecurity-trends-in-2019/]]></link>
			<title>Cybersecurity Trends in 2019</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/fortinet-your-digital-shield-against-cyber-threats/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/fortinet-your-digital-shield-against-cyber-threats/]]></link>
			<title>Fortinet: Your Digital Shield Against Cyber Threats</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/fortigate-sd-wan-modern-key-features/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/fortigate-sd-wan-modern-key-features/]]></link>
			<title>FortiGate SD-WAN Modern Key Features</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/securing-ot-infrastructure-we-cant-secure-what-we-dont-see/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/securing-ot-infrastructure-we-cant-secure-what-we-dont-see/]]></link>
			<title>Securing OT Infrastructure: We Can’t Secure What We Don’t See</title>
			<pubDate><![CDATA[Wed, 14 Aug 2024 12:08:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/it-solutions/security-as-a-service/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/it-solutions/security-as-a-service/]]></link>
			<title>Security as a Service</title>
			<pubDate><![CDATA[Tue, 27 Aug 2024 08:38:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/blog/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Thu, 20 Jun 2024 12:53:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 20 Jun 2024 12:30:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/aws-consultancy-services/custom-cloud-solutions-on-aws/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/aws-consultancy-services/custom-cloud-solutions-on-aws/]]></link>
			<title>Custom Cloud Solutions on AWS</title>
			<pubDate><![CDATA[Thu, 18 Sep 2025 08:01:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/aws-consultancy-services/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/aws-consultancy-services/]]></link>
			<title>AWS Consulting Services</title>
			<pubDate><![CDATA[Thu, 18 Sep 2025 08:00:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/aws-transit-gateway-for-multi-vpc-and-on-premises-connectivity/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/aws-transit-gateway-for-multi-vpc-and-on-premises-connectivity/]]></link>
			<title>AWS Transit Gateway for Multi-VPC and On-Premises Connectivity</title>
			<pubDate><![CDATA[Thu, 10 Apr 2025 12:44:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/medical-services-company-using-cloud-based-service-and-in-house-developed-apps/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/medical-services-company-using-cloud-based-service-and-in-house-developed-apps/]]></link>
			<title> Medical Services Company using Cloud Based service and in-house developed Apps</title>
			<pubDate><![CDATA[Thu, 08 May 2025 13:13:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/regulatory-compliance-enforcement/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/regulatory-compliance-enforcement/]]></link>
			<title> Regulatory Compliance Enforcement</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:55:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/medium-to-large-company-ot-sector/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/medium-to-large-company-ot-sector/]]></link>
			<title>Medium to Large Company (OT Sector)</title>
			<pubDate><![CDATA[Thu, 08 May 2025 12:34:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/fortisase-secure-internet-access-case-study-1/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/fortisase-secure-internet-access-case-study-1/]]></link>
			<title>FortiSASE Secure Internet Access &#8211; Case Study 1</title>
			<pubDate><![CDATA[Thu, 08 May 2025 10:07:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/sd-wan-use-cases-start-up-small-sized-business-company/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/sd-wan-use-cases-start-up-small-sized-business-company/]]></link>
			<title>SD-WAN Use Cases: Start-up Small Sized Business  Company</title>
			<pubDate><![CDATA[Thu, 08 May 2025 09:45:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/iot-solutions/iot-visibility-and-security/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/iot-solutions/iot-visibility-and-security/]]></link>
			<title>IoT Visibility and Security</title>
			<pubDate><![CDATA[Mon, 19 Aug 2024 12:06:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/aws-direct-connect-for-secure-private-network-access/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/aws-direct-connect-for-secure-private-network-access/]]></link>
			<title>AWS Direct Connect for Secure Private Network Access</title>
			<pubDate><![CDATA[Mon, 12 May 2025 14:23:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/endpoint-data-loss-prevention/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/endpoint-data-loss-prevention/]]></link>
			<title>Endpoint Data Loss Prevention</title>
			<pubDate><![CDATA[Mon, 12 May 2025 14:13:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/software-development-company/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/software-development-company/]]></link>
			<title>Software Development Company</title>
			<pubDate><![CDATA[Mon, 12 May 2025 12:01:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/crypto-asset-service-provider-using-aws/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/crypto-asset-service-provider-using-aws/]]></link>
			<title>Crypto Asset Service Provider using AWS</title>
			<pubDate><![CDATA[Mon, 12 May 2025 11:53:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/intellectual-property-ip-protection/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/intellectual-property-ip-protection/]]></link>
			<title> Intellectual Property (IP) Protection</title>
			<pubDate><![CDATA[Mon, 12 May 2025 11:27:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/cloud-application-data-protection/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/cloud-application-data-protection/]]></link>
			<title>Cloud Application Data Protection</title>
			<pubDate><![CDATA[Mon, 12 May 2025 11:18:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/mitigation-of-insider-threat/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/mitigation-of-insider-threat/]]></link>
			<title>Mitigation of Insider Threat</title>
			<pubDate><![CDATA[Mon, 12 May 2025 10:54:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/small-and-medium-enterprise/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/small-and-medium-enterprise/]]></link>
			<title>Small and Medium Enterprise</title>
			<pubDate><![CDATA[Mon, 12 May 2025 10:14:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/optimizing-it-infrastructure-and-enhancing-reliability/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/optimizing-it-infrastructure-and-enhancing-reliability/]]></link>
			<title>Optimizing IT Infrastructure and Enhancing Reliability: A Case Study of a Financial Institution in Azerbaijan</title>
			<pubDate><![CDATA[Mon, 12 May 2025 09:52:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/medium-sized-business-healthcare/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/medium-sized-business-healthcare/]]></link>
			<title> Medium Sized Business (HealthCare)</title>
			<pubDate><![CDATA[Fri, 09 May 2025 14:01:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/secure-private-access-fortisase/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/secure-private-access-fortisase/]]></link>
			<title>Secure Private Access FortiSASE</title>
			<pubDate><![CDATA[Fri, 09 May 2025 13:21:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/fortisase-secure-internet-access-case-study-2/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/fortisase-secure-internet-access-case-study-2/]]></link>
			<title>FortiSASE Secure Internet Access &#8211; Case Study 2</title>
			<pubDate><![CDATA[Fri, 09 May 2025 13:10:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/sd-wan-use-cases-large-business-corporate-hq/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/sd-wan-use-cases-large-business-corporate-hq/]]></link>
			<title>SD-WAN Use Cases: Large Business (Corporate HQ)</title>
			<pubDate><![CDATA[Fri, 09 May 2025 12:17:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/sd-wan-use-cases-medium-sized-business/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/sd-wan-use-cases-medium-sized-business/]]></link>
			<title>SD-WAN Use Cases: Medium Sized Business</title>
			<pubDate><![CDATA[Fri, 09 May 2025 10:49:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/aws-waf-for-web-application-security-owasp-mitigation/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/aws-waf-for-web-application-security-owasp-mitigation/]]></link>
			<title>AWS WAF for Web Application Security &#038; OWASP Mitigation</title>
			<pubDate><![CDATA[Fri, 09 May 2025 07:41:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/aws-shield-advanced-for-ddos-protection/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/aws-shield-advanced-for-ddos-protection/]]></link>
			<title>AWS Shield Advanced for DDoS Protection</title>
			<pubDate><![CDATA[Fri, 09 May 2025 07:41:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.insoftconsultancy.com/case-study/fortinet-ztna/]]></guid>
			<link><![CDATA[https://www.insoftconsultancy.com/case-study/fortinet-ztna/]]></link>
			<title>Fortinet ZTNA</title>
			<pubDate><![CDATA[Fri, 09 May 2025 02:25:37 +0000]]></pubDate>
		</item>
				</channel>
</rss>
