<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.cloud-security.jp/news/added-smart-boarding</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/added-smart-boarding.png</image:loc><image:caption>addedsmartboarding</image:caption><image:title>addedsmartboarding</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-10-24</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-login-with-out-password</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-login-with-out-password.webp</image:loc><image:caption>howtologinwithoutpassword</image:caption><image:title>howtologinwithoutpassword</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image-hero-v3.jpg</image:loc><image:caption>imageherov3</image:caption><image:title>imageherov3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-10-12</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-problems-and-security-risks-of-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-problems-and-security-risks-of-ppap.webp</image:loc><image:caption>theproblemsandsecurityrisksofppap</image:caption><image:title>theproblemsandsecurityrisksofppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/api-for-hennge-one-id-management</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/api-for-hennge-one-id-management.png</image:loc><image:caption>apiforhenngeoneidmanagement</image:caption><image:title>apiforhenngeoneidmanagement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-zero-trust-implemented-by-google</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust-implemented-by-google.webp</image:loc><image:caption>whatiszerotrustimplementedbygoogle</image:caption><image:title>whatiszerotrustimplementedbygoogle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/support-working-style-webinar-20200916</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2020-08-25</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/japan-dx-conference-20240618</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/solution/information-leakage-prevent</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/dlp.jpg</image:loc><image:caption>dlp</image:caption><image:title>dlp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/multi-factor-authentication.png</image:loc><image:caption>multifactorauthentication</image:caption><image:title>multifactorauthentication</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/neccesary-basic-security-for-mail-Jul-05-2024-08-20-47-8188-AM.webp</image:loc><image:caption>neccesarybasicsecurityformailJul0520240820478188AM</image:caption><image:title>neccesarybasicsecurityformailJul0520240820478188AM</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-one.webp</image:loc><image:caption>henngeone</image:caption><image:title>henngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/identity-lifecycle-management.png</image:loc><image:caption>identitylifecyclemanagement</image:caption><image:title>identitylifecyclemanagement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/measures-against-unauthorized-access.png</image:loc><image:caption>measuresagainstunauthorizedaccess</image:caption><image:title>measuresagainstunauthorizedaccess</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/url-icon.png</image:loc><image:caption>urlicon</image:caption><image:title>urlicon</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/targeted-attack-email.png</image:loc><image:caption>targetedattackemail</image:caption><image:title>targetedattackemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/incident.png</image:loc><image:caption>incident</image:caption><image:title>incident</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/solution-banner.jpg</image:loc><image:caption>solutionbanner</image:caption><image:title>solutionbanner</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-mail.png</image:loc><image:caption>iconmail</image:caption><image:title>iconmail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/surugadai-case.png</image:loc><image:caption>surugadaicase</image:caption><image:title>surugadaicase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/dangerous-file-detection.png</image:loc><image:caption>dangerousfiledetection</image:caption><image:title>dangerousfiledetection</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><lastmod>2024-07-24</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-problems-with-ppap-zip-encryption</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-problems-with-ppap-zip-encryption.webp</image:loc><image:caption>theproblemswithppapzipencryption</image:caption><image:title>theproblemswithppapzipencryption</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp</loc><video:video><video:thumbnail_loc>https://www.cloud-security.jp/hubfs/200526_HENNGE%20One%E7%B4%B9%E4%BB%8B%E5%8B%95%E7%94%BB.mp4/medium.jpg</video:thumbnail_loc><video:title>200526_HENNGE One紹介動画</video:title><video:description>200526_HENNGE One紹介動画</video:description><video:content_loc>https://www.cloud-security.jp/hubfs/200526_HENNGE%20One%E7%B4%B9%E4%BB%8B%E5%8B%95%E7%94%BB.mp4</video:content_loc><video:duration>101</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/cloud-security-hero_sp.webp</image:loc><image:caption>cloudsecurityherosp</image:caption><image:title>cloudsecurityherosp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/cloud-security-hero.webp</image:loc><image:caption>cloudsecurityhero</image:caption><image:title>cloudsecurityhero</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-onlines.svg</image:loc><image:caption>icononlines</image:caption><image:title>icononlines</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-sso.svg</image:loc><image:caption>iconsso</image:caption><image:title>iconsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/wp-file-share-guide-2024.png</image:loc><image:caption>wpfileshareguide2024</image:caption><image:title>wpfileshareguide2024</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-is-cybersecurity-management-need-now.png</image:loc><image:caption>whatiscybersecuritymanagementneednow</image:caption><image:title>whatiscybersecuritymanagementneednow</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-multiapp.svg</image:loc><image:caption>iconmultiapp</image:caption><image:title>iconmultiapp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/cloud-security%232.webp</image:loc><image:caption>cloudsecurity2</image:caption><image:title>cloudsecurity2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks.webp</image:loc><image:caption>5corporatecasesinformationleaks</image:caption><image:title>5corporatecasesinformationleaks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-changeurl.svg</image:loc><image:caption>iconchangeurl</image:caption><image:title>iconchangeurl</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-mailarc.svg</image:loc><image:caption>iconmailarc</image:caption><image:title>iconmailarc</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/cloud-security%231.webp</image:loc><image:caption>cloudsecurity1</image:caption><image:title>cloudsecurity1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/icon/value-statement-bg.jpg</image:loc><image:caption>valuestatementbg</image:caption><image:title>valuestatementbg</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-secureb.svg</image:loc><image:caption>iconsecureb</image:caption><image:title>iconsecureb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/current-highlights-of-dmarc-1.png</image:loc><image:caption>currenthighlightsofdmarc1</image:caption><image:title>currenthighlightsofdmarc1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-08-22</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-latest-authentication-infrastructure-with-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-latest-authentication-infrastructure-with-zero-trust.webp</image:loc><image:caption>thelatestauthenticationinfrastructurewithzerotrust</image:caption><image:title>thelatestauthenticationinfrastructurewithzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/seminar-avoiding-risk-information-leaks-202406</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/seminar-avoiding-risk-information-leaks.jpg</image:loc><image:caption>seminaravoidingriskinformationleaks</image:caption><image:title>seminaravoidingriskinformationleaks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://www.cloud-security.jp/news/synq-remote-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/synq-remote-x-henngeone.png</image:loc><image:caption>synqremotexhenngeone</image:caption><image:title>synqremotexhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-07-22</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/how-to-secure-dx</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2021-06-30</lastmod></url><url><loc>https://www.cloud-security.jp/resource/kawai-musical-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/kawai-musical-case.png</image:loc><image:caption>kawaimusicalcase</image:caption><image:title>kawaimusicalcase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-azure-security-center</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-azure-security-center.webp</image:loc><image:caption>whatisazuresecuritycenter</image:caption><image:title>whatisazuresecuritycenter</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/box-collaboration</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-collaboration.webp</image:loc><image:caption>boxcollaboration</image:caption><image:title>boxcollaboration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/digitization-and-cloud-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/digitization-and-cloud-security-01.png</image:loc><image:caption>digitizationandcloudsecurity01</image:caption><image:title>digitizationandcloudsecurity01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/digitization-and-cloud-security-02.png</image:loc><image:caption>digitizationandcloudsecurity02</image:caption><image:title>digitizationandcloudsecurity02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/digitization-and-cloud-security.png</image:loc><image:caption>digitizationandcloudsecurity</image:caption><image:title>digitizationandcloudsecurity</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/information-system-camp-20240418</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/blend-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/blend-x-henngeone.png</image:loc><image:caption>blendxhenngeone</image:caption><image:title>blendxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-11-16</lastmod></url><url><loc>https://www.cloud-security.jp/news/20240118_optim</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/%E3%82%B9%E3%82%AF%E3%83%AA%E3%83%BC%E3%83%B3%E3%82%B7%E3%83%A7%E3%83%83%E3%83%88%202024-02-08%20170250.png</image:loc><image:caption>スクリーンショット20240208170250</image:caption><image:title>スクリーンショット20240208170250</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-03-05</lastmod></url><url><loc>https://www.cloud-security.jp/blog/targeted-attack-emails</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails-2.webp</image:loc><image:caption>targetedattackemails2</image:caption><image:title>targetedattackemails2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools.webp</image:loc><image:caption>7visualizationtools</image:caption><image:title>7visualizationtools</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails-3.webp</image:loc><image:caption>targetedattackemails3</image:caption><image:title>targetedattackemails3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-01.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware01</image:caption><image:title>howtocheckcomputerinfectedmalware01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails.webp</image:loc><image:caption>targetedattackemails</image:caption><image:title>targetedattackemails</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks.webp</image:loc><image:caption>5corporatecasesinformationleaks</image:caption><image:title>5corporatecasesinformationleaks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails-4.webp</image:loc><image:caption>targetedattackemails4</image:caption><image:title>targetedattackemails4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails-1.webp</image:loc><image:caption>targetedattackemails1</image:caption><image:title>targetedattackemails1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks.webp</image:loc><image:caption>whattrainingtargetedemailattacks</image:caption><image:title>whattrainingtargetedemailattacks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails-5.webp</image:loc><image:caption>targetedattackemails5</image:caption><image:title>targetedattackemails5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/system-structure-for-sso</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/system-structure-for-sso.webp</image:loc><image:caption>systemstructureforsso</image:caption><image:title>systemstructureforsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/karuta-workshop-20240306</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/karuta-workshop-20240306.png</image:loc><image:caption>karutaworkshop20240306</image:caption><image:title>karutaworkshop20240306</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/mr-amane-sawatari.jpeg</image:loc><image:caption>mramanesawatari</image:caption><image:title>mramanesawatari</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-01-31</lastmod></url><url><loc>https://www.cloud-security.jp/news/sactona-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/sactona-x-henngeone.png</image:loc><image:caption>sactonaxhenngeone</image:caption><image:title>sactonaxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-06-19</lastmod></url><url><loc>https://www.cloud-security.jp/blog/box-electronic-books-maintenance-act</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-electronic-books-maintenance-act.webp</image:loc><image:caption>boxelectronicbooksmaintenanceact</image:caption><image:title>boxelectronicbooksmaintenanceact</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-measures-required-for-remote-access</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-measures-required-for-remote-access.webp</image:loc><image:caption>securitymeasuresrequiredforremoteaccess</image:caption><image:title>securitymeasuresrequiredforremoteaccess</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/gmail-security-diagnostic-methods-and-enhancements</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/gmail-security-diagnostic-methods-and-enhancements.webp</image:loc><image:caption>gmailsecuritydiagnosticmethodsandenhancements</image:caption><image:title>gmailsecuritydiagnosticmethodsandenhancements</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-spoofed-email</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-2.webp</image:loc><image:caption>whatisspoofedemail2</image:caption><image:title>whatisspoofedemail2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-7.webp</image:loc><image:caption>whatisspoofedemail7</image:caption><image:title>whatisspoofedemail7</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-6.webp</image:loc><image:caption>whatisspoofedemail6</image:caption><image:title>whatisspoofedemail6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-8.webp</image:loc><image:caption>whatisspoofedemail8</image:caption><image:title>whatisspoofedemail8</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-5.webp</image:loc><image:caption>whatisspoofedemail5</image:caption><image:title>whatisspoofedemail5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-9.webp</image:loc><image:caption>whatisspoofedemail9</image:caption><image:title>whatisspoofedemail9</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-3.webp</image:loc><image:caption>whatisspoofedemail3</image:caption><image:title>whatisspoofedemail3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-4.webp</image:loc><image:caption>whatisspoofedemail4</image:caption><image:title>whatisspoofedemail4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email-1.webp</image:loc><image:caption>whatisspoofedemail1</image:caption><image:title>whatisspoofedemail1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-spoofed-email.webp</image:loc><image:caption>whatisspoofedemail</image:caption><image:title>whatisspoofedemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/kengo-kuma-associates-architects-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/kengo-kuma-associates-architects-case.png</image:loc><image:caption>kengokumaassociatesarchitectscase</image:caption><image:title>kengokumaassociatesarchitectscase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/kengo-kuma-associates-architects-case-01.png</image:loc><image:caption>kengokumaassociatesarchitectscase01</image:caption><image:title>kengokumaassociatesarchitectscase01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/kengo-kuma-associates-architects-case-02.png</image:loc><image:caption>kengokumaassociatesarchitectscase02</image:caption><image:title>kengokumaassociatesarchitectscase02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/mail-cloud-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/mail-cloud-security.webp</image:loc><image:caption>mailcloudsecurity</image:caption><image:title>mailcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-in-construction-industry</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-in-construction-industry.webp</image:loc><image:caption>securityinconstructionindustry</image:caption><image:title>securityinconstructionindustry</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-in-construction-industry-1.webp</image:loc><image:caption>securityinconstructionindustry1</image:caption><image:title>securityinconstructionindustry1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/the-current-state-of-ppap-webinar-20210316</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2021-02-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/skypce-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/skypce-x-hennge.webp</image:loc><image:caption>skypcexhennge</image:caption><image:title>skypcexhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-07-25</lastmod></url><url><loc>https://www.cloud-security.jp/blog/retail-dx</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/retail-dx.webp</image:loc><image:caption>retaildx</image:caption><image:title>retaildx</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/leagalforce-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/leagalforce-x-hennge.jpeg</image:loc><image:caption>leagalforcexhennge</image:caption><image:title>leagalforcexhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/20210922_webinar</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2021-09-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/merit-and-demerit-of-zerotorust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/merit-and-demerit-of-zerotorust.webp</image:loc><image:caption>meritanddemeritofzerotorust</image:caption><image:title>meritanddemeritofzerotorust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-training-targeted-email-attacks</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks-6.webp</image:loc><image:caption>whattrainingtargetedemailattacks6</image:caption><image:title>whattrainingtargetedemailattacks6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks-7.webp</image:loc><image:caption>whattrainingtargetedemailattacks7</image:caption><image:title>whattrainingtargetedemailattacks7</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks.webp</image:loc><image:caption>whattrainingtargetedemailattacks</image:caption><image:title>whattrainingtargetedemailattacks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks.webp</image:loc><image:caption>5corporatecasesinformationleaks</image:caption><image:title>5corporatecasesinformationleaks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails.webp</image:loc><image:caption>targetedattackemails</image:caption><image:title>targetedattackemails</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks-3.webp</image:loc><image:caption>whattrainingtargetedemailattacks3</image:caption><image:title>whattrainingtargetedemailattacks3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools.webp</image:loc><image:caption>7visualizationtools</image:caption><image:title>7visualizationtools</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-01.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware01</image:caption><image:title>howtocheckcomputerinfectedmalware01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks-5.webp</image:loc><image:caption>whattrainingtargetedemailattacks5</image:caption><image:title>whattrainingtargetedemailattacks5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks-4.webp</image:loc><image:caption>whattrainingtargetedemailattacks4</image:caption><image:title>whattrainingtargetedemailattacks4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks-2.webp</image:loc><image:caption>whattrainingtargetedemailattacks2</image:caption><image:title>whattrainingtargetedemailattacks2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks-1.webp</image:loc><image:caption>whattrainingtargetedemailattacks1</image:caption><image:title>whattrainingtargetedemailattacks1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/securedeliver-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/securedeliver-x-hennge.jpeg</image:loc><image:caption>securedeliverxhennge</image:caption><image:title>securedeliverxhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/news/fortinet-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/fortinet-x-hennge.jpeg</image:loc><image:caption>fortinetxhennge</image:caption><image:title>fortinetxhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-meet-up-2021</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2021-12-09</lastmod></url><url><loc>https://www.cloud-security.jp/news/hennge-unveiled-2025</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/hennge-unveiled-2025.webp</image:loc><image:caption>henngeunveiled2025</image:caption><image:title>henngeunveiled2025</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-25</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-splunk</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk-3.webp</image:loc><image:caption>whatissplunk3</image:caption><image:title>whatissplunk3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk-2.webp</image:loc><image:caption>whatissplunk2</image:caption><image:title>whatissplunk2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk-1.webp</image:loc><image:caption>whatissplunk1</image:caption><image:title>whatissplunk1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/email-server-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/email-server-security.webp</image:loc><image:caption>emailserversecurity</image:caption><image:title>emailserversecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/problems-with-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/problems-with-ppap.webp</image:loc><image:caption>problemswithppap</image:caption><image:title>problemswithppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-impact-businesses-end-support-microsoft-office-2019</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-impact-businesses-end-support-microsoft-office-2019-1-2.webp</image:loc><image:caption>whatisimpactbusinessesendsupportmicrosoftoffice201912</image:caption><image:title>whatisimpactbusinessesendsupportmicrosoftoffice201912</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-impact-businesses-end-support-microsoft-office-2019-3-2.webp</image:loc><image:caption>whatisimpactbusinessesendsupportmicrosoftoffice201932</image:caption><image:title>whatisimpactbusinessesendsupportmicrosoftoffice201932</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-impact-businesses-end-support-microsoft-office-2019-2-2.webp</image:loc><image:caption>whatisimpactbusinessesendsupportmicrosoftoffice201922</image:caption><image:title>whatisimpactbusinessesendsupportmicrosoftoffice201922</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-impact-businesses-end-support-microsoft-office-2019-Jul-05-2024-08-20-29-6705-AM.webp</image:loc><image:caption>whatisimpactbusinessesendsupportmicrosoftoffice2019Jul0520240820296705AM</image:caption><image:title>whatisimpactbusinessesendsupportmicrosoftoffice2019Jul0520240820296705AM</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/city-ascom-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/city-ascom-case.png</image:loc><image:caption>cityascomcase</image:caption><image:title>cityascomcase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/the-idea-zero-trust-webinar-20210420</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/the-idea-zero-trust-webinar-20210420.jpg</image:loc><image:caption>theideazerotrustwebinar20210420</image:caption><image:title>theideazerotrustwebinar20210420</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2021-03-05</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-laas-security-counter-plan</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-laas-security-counter-plan.webp</image:loc><image:caption>whatislaassecuritycounterplan</image:caption><image:title>whatislaassecuritycounterplan</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/itmedia-20240611</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/deal-with-unauthorized-access</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/deal-with-unauthorized-access.webp</image:loc><image:caption>dealwithunauthorizedaccess</image:caption><image:title>dealwithunauthorizedaccess</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/deal-with-unauthorized-access-1.webp</image:loc><image:caption>dealwithunauthorizedaccess1</image:caption><image:title>dealwithunauthorizedaccess1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/business-e-mail-compromise</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise-01.webp</image:loc><image:caption>businessemailcompromise01</image:caption><image:title>businessemailcompromise01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime.webp</image:loc><image:caption>whatissmime</image:caption><image:title>whatissmime</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-ppap-problem-in-business-email</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-ppap-problem-in-business-email.webp</image:loc><image:caption>theppapprobleminbusinessemail</image:caption><image:title>theppapprobleminbusinessemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/jinjer-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/jinjer-x-henngeone.jpeg</image:loc><image:caption>jinjerxhenngeone</image:caption><image:title>jinjerxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/webinar-to-ask-all-your-daily-questions-20220610</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-meet-up-202212</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2022-12-21</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/ricoh-japan-webinar-20240828</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/yamaha-motor-robotics-holdings</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/yamaha-motor-robotics-holdings.png</image:loc><image:caption>yamahamotorroboticsholdings</image:caption><image:title>yamahamotorroboticsholdings</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/xtechkansai-20240516</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/hitto-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/hitto-x-henngeone.png</image:loc><image:caption>hittoxhenngeone</image:caption><image:title>hittoxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-device-certificate</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-idaas-that-realize-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idaas-that-realize-zero-trust.webp</image:loc><image:caption>whatisidaasthatrealizezerotrust</image:caption><image:title>whatisidaasthatrealizezerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-definition-of-the-zero-trust-model</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-definition-of-the-zero-trust-model.webp</image:loc><image:caption>thedefinitionofthezerotrustmodel</image:caption><image:title>thedefinitionofthezerotrustmodel</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/drsum-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/drsum-x-henngeone.png</image:loc><image:caption>drsumxhenngeone</image:caption><image:title>drsumxhenngeone</image:title></image:image><lastmod>2024-03-25</lastmod></url><url><loc>https://www.cloud-security.jp/news/wix-enterprise-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/wix-enterprise-x-henngeone.webp</image:loc><image:caption>wixenterprisexhenngeone</image:caption><image:title>wixenterprisexhenngeone</image:title></image:image><lastmod>2024-07-25</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/dx-tools-that-lead-to-increased-work-efficiency</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-apt-attack</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-apt-attack.webp</image:loc><image:caption>whatisaptattack</image:caption><image:title>whatisaptattack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime.webp</image:loc><image:caption>whatissmime</image:caption><image:title>whatissmime</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-01.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware01</image:caption><image:title>howtocheckcomputerinfectedmalware01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools.webp</image:loc><image:caption>7visualizationtools</image:caption><image:title>7visualizationtools</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks.webp</image:loc><image:caption>5corporatecasesinformationleaks</image:caption><image:title>5corporatecasesinformationleaks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image-hero-v3.webp</image:loc><image:caption>imageherov3</image:caption><image:title>imageherov3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/office365-security-risk.webp</image:loc><image:caption>office365securityrisk</image:caption><image:title>office365securityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal.webp</image:loc><image:caption>whatisvpnremoval</image:caption><image:title>whatisvpnremoval</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/azure-security-center-basic-information.webp</image:loc><image:caption>azuresecuritycenterbasicinformation</image:caption><image:title>azuresecuritycenterbasicinformation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap.webp</image:loc><image:caption>whatisiap</image:caption><image:title>whatisiap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/ransomware-transmitted-by-email</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email-05.webp</image:loc><image:caption>ransomwaretransmittedbyemail05</image:caption><image:title>ransomwaretransmittedbyemail05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email-03.webp</image:loc><image:caption>ransomwaretransmittedbyemail03</image:caption><image:title>ransomwaretransmittedbyemail03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email-04.webp</image:loc><image:caption>ransomwaretransmittedbyemail04</image:caption><image:title>ransomwaretransmittedbyemail04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email-01.webp</image:loc><image:caption>ransomwaretransmittedbyemail01</image:caption><image:title>ransomwaretransmittedbyemail01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email-06.webp</image:loc><image:caption>ransomwaretransmittedbyemail06</image:caption><image:title>ransomwaretransmittedbyemail06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime.webp</image:loc><image:caption>whatissmime</image:caption><image:title>whatissmime</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email-02.webp</image:loc><image:caption>ransomwaretransmittedbyemail02</image:caption><image:title>ransomwaretransmittedbyemail02</image:title></image:image><lastmod>2025-04-18</lastmod></url><url><loc>https://www.cloud-security.jp/news/hennge-secure-download-for-box</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/hennge-secure-download-for-box.png</image:loc><image:caption>henngesecuredownloadforbox</image:caption><image:title>henngesecuredownloadforbox</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/box_x_henngeone.png</image:loc><image:caption>boxxhenngeone</image:caption><image:title>boxxhenngeone</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/resource/hennge-one</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-one-01.png</image:loc><image:caption>henngeone01</image:caption><image:title>henngeone01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-one.png</image:loc><image:caption>henngeone</image:caption><image:title>henngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-one-02.png</image:loc><image:caption>henngeone02</image:caption><image:title>henngeone02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/azure-security-center-basic-information</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/azure-security-center-basic-information-01.webp</image:loc><image:caption>azuresecuritycenterbasicinformation01</image:caption><image:title>azuresecuritycenterbasicinformation01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/azure-security-center-basic-information.webp</image:loc><image:caption>azuresecuritycenterbasicinformation</image:caption><image:title>azuresecuritycenterbasicinformation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/azure-security-center-basic-information-02.webp</image:loc><image:caption>azuresecuritycenterbasicinformation02</image:caption><image:title>azuresecuritycenterbasicinformation02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/asahi-iron-works-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/asahi-iron-works-case.png</image:loc><image:caption>asahiironworkscase</image:caption><image:title>asahiironworkscase</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-prevent-emails-sent-wrong-person-outlook</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-6.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook6</image:caption><image:title>howpreventemailssentwrongpersonoutlook6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-4.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook4</image:caption><image:title>howpreventemailssentwrongpersonoutlook4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-11.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook11</image:caption><image:title>howpreventemailssentwrongpersonoutlook11</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-7.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook7</image:caption><image:title>howpreventemailssentwrongpersonoutlook7</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-3.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook3</image:caption><image:title>howpreventemailssentwrongpersonoutlook3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-10.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook10</image:caption><image:title>howpreventemailssentwrongpersonoutlook10</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-9.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook9</image:caption><image:title>howpreventemailssentwrongpersonoutlook9</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-5.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook5</image:caption><image:title>howpreventemailssentwrongpersonoutlook5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-1.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook1</image:caption><image:title>howpreventemailssentwrongpersonoutlook1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-2.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook2</image:caption><image:title>howpreventemailssentwrongpersonoutlook2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-12.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook12</image:caption><image:title>howpreventemailssentwrongpersonoutlook12</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook-8.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook8</image:caption><image:title>howpreventemailssentwrongpersonoutlook8</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-local-breakout</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout-02.webp</image:loc><image:caption>whatislocalbreakout02</image:caption><image:title>whatislocalbreakout02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/office365-security-risk.webp</image:loc><image:caption>office365securityrisk</image:caption><image:title>office365securityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout-04.webp</image:loc><image:caption>whatislocalbreakout04</image:caption><image:title>whatislocalbreakout04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout-01.webp</image:loc><image:caption>whatislocalbreakout01</image:caption><image:title>whatislocalbreakout01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout-05.webp</image:loc><image:caption>whatislocalbreakout05</image:caption><image:title>whatislocalbreakout05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout-03.webp</image:loc><image:caption>whatislocalbreakout03</image:caption><image:title>whatislocalbreakout03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout-06.webp</image:loc><image:caption>whatislocalbreakout06</image:caption><image:title>whatislocalbreakout06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-realize-zero-trust-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-realize-zero-trust-security.webp</image:loc><image:caption>howtorealizezerotrustsecurity</image:caption><image:title>howtorealizezerotrustsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/dark-web-survey-campaign</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/dark-web-survey-campaign.webp</image:loc><image:caption>darkwebsurveycampaign</image:caption><image:title>darkwebsurveycampaign</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/ipa-zero-trust-instruction-book</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/ipa-zero-trust-instruction-book.webp</image:loc><image:caption>ipazerotrustinstructionbook</image:caption><image:title>ipazerotrustinstructionbook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/desknetsneo-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/desknetsneo-x-hennge.jpeg</image:loc><image:caption>desknetsneoxhennge</image:caption><image:title>desknetsneoxhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/desknetsneo-x-hennge-1.jpeg</image:loc><image:caption>desknetsneoxhennge1</image:caption><image:title>desknetsneoxhennge1</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-measure-tool</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-measure-tool.webp</image:loc><image:caption>securitymeasuretool</image:caption><image:title>securitymeasuretool</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/problems-with-introducing-byod</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/problems-with-introducing-byod.webp</image:loc><image:caption>problemswithintroducingbyod</image:caption><image:title>problemswithintroducingbyod</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/problems-with-introducing-byod-1.webp</image:loc><image:caption>problemswithintroducingbyod1</image:caption><image:title>problemswithintroducingbyod1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-security-measures-for-google-workspace</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-security-measures-for-google-workspace.webp</image:loc><image:caption>thesecuritymeasuresforgoogleworkspace</image:caption><image:title>thesecuritymeasuresforgoogleworkspace</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-access-control</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/shutterstock_1654003363%20(1)-1.jpg</image:loc><image:caption>shutterstock165400336311</image:caption><image:title>shutterstock165400336311</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-access-control.webp</image:loc><image:caption>whatisaccesscontrol</image:caption><image:title>whatisaccesscontrol</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-spread-of-remote-work</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-spread-of-remote-work.webp</image:loc><image:caption>thespreadofremotework</image:caption><image:title>thespreadofremotework</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/3pitfalls-of-email-security-measures</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/3pitfalls-of-email-security-measures-01.png</image:loc><image:caption>3pitfallsofemailsecuritymeasures01</image:caption><image:title>3pitfallsofemailsecuritymeasures01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/3pitfalls-of-email-security-measures.jpg</image:loc><image:caption>3pitfallsofemailsecuritymeasures</image:caption><image:title>3pitfallsofemailsecuritymeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/3pitfalls-of-email-security-measures-02.png</image:loc><image:caption>3pitfallsofemailsecuritymeasures02</image:caption><image:title>3pitfallsofemailsecuritymeasures02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/resource/familymart-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/familymart-case.png</image:loc><image:caption>familymartcase</image:caption><image:title>familymartcase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/cyber-attacks-aware-in-2023</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cyber-attacks-aware-in-2023.webp</image:loc><image:caption>cyberattacksawarein2023</image:caption><image:title>cyberattacksawarein2023</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cyber-attacks-aware-in-2023-1.webp</image:loc><image:caption>cyberattacksawarein20231</image:caption><image:title>cyberattacksawarein20231</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/cix-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/cix-x-henngeone.png</image:loc><image:caption>cixxhenngeone</image:caption><image:title>cixxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-05-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/dx-security-measures-by-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/dx-security-measures-by-zero-trust.webp</image:loc><image:caption>dxsecuritymeasuresbyzerotrust</image:caption><image:title>dxsecuritymeasuresbyzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/kingoftime-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/kingoftime-x-hennge.jpeg</image:loc><image:caption>kingoftimexhennge</image:caption><image:title>kingoftimexhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/windows-10-mail-security-measurement</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/windows-10-mail-security-measurement.webp</image:loc><image:caption>windows10mailsecuritymeasurement</image:caption><image:title>windows10mailsecuritymeasurement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-for-outlook-mail.webp</image:loc><image:caption>securityforoutlookmail</image:caption><image:title>securityforoutlookmail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap-4.webp</image:loc><image:caption>whatisppap4</image:caption><image:title>whatisppap4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap-3.webp</image:loc><image:caption>whatisppap3</image:caption><image:title>whatisppap3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap-5.webp</image:loc><image:caption>whatisppap5</image:caption><image:title>whatisppap5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap-1.webp</image:loc><image:caption>whatisppap1</image:caption><image:title>whatisppap1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap-2.webp</image:loc><image:caption>whatisppap2</image:caption><image:title>whatisppap2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-unlimited-cloud-storage</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-unlimited-cloud-storage-05.webp</image:loc><image:caption>whatisunlimitedcloudstorage05</image:caption><image:title>whatisunlimitedcloudstorage05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-unlimited-cloud-storage-02.webp</image:loc><image:caption>whatisunlimitedcloudstorage02</image:caption><image:title>whatisunlimitedcloudstorage02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-unlimited-cloud-storage-06.webp</image:loc><image:caption>whatisunlimitedcloudstorage06</image:caption><image:title>whatisunlimitedcloudstorage06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-unlimited-cloud-storage-07.webp</image:loc><image:caption>whatisunlimitedcloudstorage07</image:caption><image:title>whatisunlimitedcloudstorage07</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-unlimited-cloud-storage-04.webp</image:loc><image:caption>whatisunlimitedcloudstorage04</image:caption><image:title>whatisunlimitedcloudstorage04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-unlimited-cloud-storage-01.webp</image:loc><image:caption>whatisunlimitedcloudstorage01</image:caption><image:title>whatisunlimitedcloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-unlimited-cloud-storage-03.webp</image:loc><image:caption>whatisunlimitedcloudstorage03</image:caption><image:title>whatisunlimitedcloudstorage03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/saas-security-safety</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/saas-security-safety.webp</image:loc><image:caption>saassecuritysafety</image:caption><image:title>saassecuritysafety</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/e-mail-security-edition</loc><video:video><video:thumbnail_loc>https://www.cloud-security.jp/hubfs/200526_HENNGE%20One%E7%B4%B9%E4%BB%8B%E5%8B%95%E7%94%BB.mp4/medium.jpg</video:thumbnail_loc><video:title>200526_HENNGE One紹介動画</video:title><video:description>200526_HENNGE One紹介動画</video:description><video:content_loc>https://www.cloud-security.jp/hubfs/200526_HENNGE%20One%E7%B4%B9%E4%BB%8B%E5%8B%95%E7%94%BB.mp4</video:content_loc><video:duration>101</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cloud-security.jp/hubfs/shutterstock_1368463694%20(1).jpg</image:loc><image:caption>shutterstock13684636941</image:caption><image:title>shutterstock13684636941</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-target.svg</image:loc><image:caption>icontarget</image:caption><image:title>icontarget</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image03.jpg</image:loc><image:caption>image03</image:caption><image:title>image03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-changeurl.svg</image:loc><image:caption>iconchangeurl</image:caption><image:title>iconchangeurl</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/the-security-measures-for-google-workspace.png</image:loc><image:caption>thesecuritymeasuresforgoogleworkspace</image:caption><image:title>thesecuritymeasuresforgoogleworkspace</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image02.jpg</image:loc><image:caption>image02</image:caption><image:title>image02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/Hennge-one-support.svg</image:loc><image:caption>Henngeonesupport</image:caption><image:title>Henngeonesupport</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image-hero-v3.webp</image:loc><image:caption>imageherov3</image:caption><image:title>imageherov3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-adresschange.svg</image:loc><image:caption>iconadresschange</image:caption><image:title>iconadresschange</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-onlines.svg</image:loc><image:caption>icononlines</image:caption><image:title>icononlines</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/email_security.jpeg</image:loc><image:caption>emailsecurity</image:caption><image:title>emailsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-mailnsp.svg</image:loc><image:caption>iconmailnsp</image:caption><image:title>iconmailnsp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-mailarc.svg</image:loc><image:caption>iconmailarc</image:caption><image:title>iconmailarc</image:title></image:image><lastmod>2024-06-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/box-secure-cloud-storage</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-02.webp</image:loc><image:caption>boxsecurecloudstorage02</image:caption><image:title>boxsecurecloudstorage02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-04.webp</image:loc><image:caption>boxsecurecloudstorage04</image:caption><image:title>boxsecurecloudstorage04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-07.webp</image:loc><image:caption>boxsecurecloudstorage07</image:caption><image:title>boxsecurecloudstorage07</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-05.webp</image:loc><image:caption>boxsecurecloudstorage05</image:caption><image:title>boxsecurecloudstorage05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-03.webp</image:loc><image:caption>boxsecurecloudstorage03</image:caption><image:title>boxsecurecloudstorage03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-06.webp</image:loc><image:caption>boxsecurecloudstorage06</image:caption><image:title>boxsecurecloudstorage06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/bihinkanri-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/bihinkanri-x-henngeone.png</image:loc><image:caption>bihinkanrixhenngeone</image:caption><image:title>bihinkanrixhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-03-06</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-siem</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-siem-04.webp</image:loc><image:caption>whatissiem04</image:caption><image:title>whatissiem04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-siem-05.webp</image:loc><image:caption>whatissiem05</image:caption><image:title>whatissiem05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-siem.webp</image:loc><image:caption>whatissiem</image:caption><image:title>whatissiem</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-siem-01.webp</image:loc><image:caption>whatissiem01</image:caption><image:title>whatissiem01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-siem-06.webp</image:loc><image:caption>whatissiem06</image:caption><image:title>whatissiem06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-siem-02.webp</image:loc><image:caption>whatissiem02</image:caption><image:title>whatissiem02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-siem-03.webp</image:loc><image:caption>whatissiem03</image:caption><image:title>whatissiem03</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-set-mail-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-set-mail-security.webp</image:loc><image:caption>howtosetmailsecurity</image:caption><image:title>howtosetmailsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-core-tool-online-storage</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-core-tool-online-storage.webp</image:loc><image:caption>thecoretoolonlinestorage</image:caption><image:title>thecoretoolonlinestorage</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/role-and-weaknesses-vpn-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/role-and-weaknesses-vpn-security.webp</image:loc><image:caption>roleandweaknessesvpnsecurity</image:caption><image:title>roleandweaknessesvpnsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/role-and-weaknesses-vpn-security-1-1.webp</image:loc><image:caption>roleandweaknessesvpnsecurity11</image:caption><image:title>roleandweaknessesvpnsecurity11</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/role-and-weaknesses-vpn-security-2.webp</image:loc><image:caption>roleandweaknessesvpnsecurity2</image:caption><image:title>roleandweaknessesvpnsecurity2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/role-and-weaknesses-vpn-security-3-1.webp</image:loc><image:caption>roleandweaknessesvpnsecurity31</image:caption><image:title>roleandweaknessesvpnsecurity31</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-sso-authentication</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-sso-authentication-03.webp</image:loc><image:caption>whatisssoauthentication03</image:caption><image:title>whatisssoauthentication03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-sso-authentication-04.webp</image:loc><image:caption>whatisssoauthentication04</image:caption><image:title>whatisssoauthentication04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-sso-authentication-01.webp</image:loc><image:caption>whatisssoauthentication01</image:caption><image:title>whatisssoauthentication01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-sso-authentication.webp</image:loc><image:caption>whatisssoauthentication</image:caption><image:title>whatisssoauthentication</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-sso-authentication-02.webp</image:loc><image:caption>whatisssoauthentication02</image:caption><image:title>whatisssoauthentication02</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/hennge-quest-2-20230314</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/yamashita_yasunori.png</image:loc><image:caption>yamashitayasunori</image:caption><image:title>yamashitayasunori</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/hennge-quest-2-20230314.png</image:loc><image:caption>henngequest220230314</image:caption><image:title>henngequest220230314</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-03-13</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-for-google-mail</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/office365-security-risk.webp</image:loc><image:caption>office365securityrisk</image:caption><image:title>office365securityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/shutterstock_1389690929%20(2).jpg</image:loc><image:caption>shutterstock13896909292</image:caption><image:title>shutterstock13896909292</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/kintone-security-level.webp</image:loc><image:caption>kintonesecuritylevel</image:caption><image:title>kintonesecuritylevel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-for-google-mail.webp</image:loc><image:caption>securityforgooglemail</image:caption><image:title>securityforgooglemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-mail-wise-functions-and-security-measures-provided</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-mail-wise-functions-and-security-measures-provided.webp</image:loc><image:caption>themailwisefunctionsandsecuritymeasuresprovided</image:caption><image:title>themailwisefunctionsandsecuritymeasuresprovided</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/reasons-for-discontinuation-and-problems-of-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/reasons-for-discontinuation-and-problems-of-ppap.webp</image:loc><image:caption>reasonsfordiscontinuationandproblemsofppap</image:caption><image:title>reasonsfordiscontinuationandproblemsofppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/companies-abolishing-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/companies-abolishing-ppap.webp</image:loc><image:caption>companiesabolishingppap</image:caption><image:title>companiesabolishingppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/googledrive-security-corporation</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation-1.webp</image:loc><image:caption>googledrivesecuritycorporation1</image:caption><image:title>googledrivesecuritycorporation1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation-2.webp</image:loc><image:caption>googledrivesecuritycorporation2</image:caption><image:title>googledrivesecuritycorporation2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation-3.webp</image:loc><image:caption>googledrivesecuritycorporation3</image:caption><image:title>googledrivesecuritycorporation3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/zip-encryption-for-attachment</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/zip-encryption-for-attachment.webp</image:loc><image:caption>zipencryptionforattachment</image:caption><image:title>zipencryptionforattachment</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/difference-safe-and-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust-3.webp</image:loc><image:caption>differencesafeandzerotrust3</image:caption><image:title>differencesafeandzerotrust3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/limit-with-vpn.webp</image:loc><image:caption>limitwithvpn</image:caption><image:title>limitwithvpn</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust-2.webp</image:loc><image:caption>differencesafeandzerotrust2</image:caption><image:title>differencesafeandzerotrust2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust-4.webp</image:loc><image:caption>differencesafeandzerotrust4</image:caption><image:title>differencesafeandzerotrust4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust-1.webp</image:loc><image:caption>differencesafeandzerotrust1</image:caption><image:title>differencesafeandzerotrust1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-dmarc</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dmarc-2.webp</image:loc><image:caption>whatisdmarc2</image:caption><image:title>whatisdmarc2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dmarc-6.webp</image:loc><image:caption>whatisdmarc6</image:caption><image:title>whatisdmarc6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dmarc-4.webp</image:loc><image:caption>whatisdmarc4</image:caption><image:title>whatisdmarc4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dmarc-1.webp</image:loc><image:caption>whatisdmarc1</image:caption><image:title>whatisdmarc1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dmarc.webp</image:loc><image:caption>whatisdmarc</image:caption><image:title>whatisdmarc</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dmarc-5.webp</image:loc><image:caption>whatisdmarc5</image:caption><image:title>whatisdmarc5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dmarc-3.webp</image:loc><image:caption>whatisdmarc3</image:caption><image:title>whatisdmarc3</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-market-size-of-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-market-size-of-zero-trust.webp</image:loc><image:caption>themarketsizeofzerotrust</image:caption><image:title>themarketsizeofzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/5-ways-prevent-email-sent-mistake</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/5-ways-prevent-email-sent-mistake.webp</image:loc><image:caption>5wayspreventemailsentmistake</image:caption><image:title>5wayspreventemailsentmistake</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/three-things-about-cloud-migration</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/three-things-about-cloud-migration-01.png</image:loc><image:caption>threethingsaboutcloudmigration01</image:caption><image:title>threethingsaboutcloudmigration01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/three-things-about-cloud-migration-02.png</image:loc><image:caption>threethingsaboutcloudmigration02</image:caption><image:title>threethingsaboutcloudmigration02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/three-things-about-cloud-migration.png</image:loc><image:caption>threethingsaboutcloudmigration</image:caption><image:title>threethingsaboutcloudmigration</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/blog/prevent-spoofing</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/prevent-spoofing.webp</image:loc><image:caption>preventspoofing</image:caption><image:title>preventspoofing</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/prevent-spoofing-1.webp</image:loc><image:caption>preventspoofing1</image:caption><image:title>preventspoofing1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/shutterstock_1654003363%20(1).jpg</image:loc><image:caption>shutterstock16540033631</image:caption><image:title>shutterstock16540033631</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/the-current-state-of-ppap-and-alternatives</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-current-state-of-ppap-and-alternatives-02.png</image:loc><image:caption>thecurrentstateofppapandalternatives02</image:caption><image:title>thecurrentstateofppapandalternatives02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-current-state-of-ppap-and-alternatives.png</image:loc><image:caption>thecurrentstateofppapandalternatives</image:caption><image:title>thecurrentstateofppapandalternatives</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-current-state-of-ppap-and-alternatives-01.png</image:loc><image:caption>thecurrentstateofppapandalternatives01</image:caption><image:title>thecurrentstateofppapandalternatives01</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-filtering</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-filtering.webp</image:loc><image:caption>whatisfiltering</image:caption><image:title>whatisfiltering</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/onedrive-security-risk</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk-1.webp</image:loc><image:caption>onedrivesecurityrisk1</image:caption><image:title>onedrivesecurityrisk1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/aws-risk-and-security.webp</image:loc><image:caption>awsriskandsecurity</image:caption><image:title>awsriskandsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk-2.webp</image:loc><image:caption>onedrivesecurityrisk2</image:caption><image:title>onedrivesecurityrisk2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/pppa</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/ppap-4.png</image:loc><image:caption>ppap4</image:caption><image:title>ppap4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/ppap-2.png</image:loc><image:caption>ppap2</image:caption><image:title>ppap2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/ppap-3.png</image:loc><image:caption>ppap3</image:caption><image:title>ppap3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/ppap-5.png</image:loc><image:caption>ppap5</image:caption><image:title>ppap5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/ppap-1.png</image:loc><image:caption>ppap1</image:caption><image:title>ppap1</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-neccesary-security-for-mail</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-neccesary-security-for-mail.webp</image:loc><image:caption>whatisneccesarysecurityformail</image:caption><image:title>whatisneccesarysecurityformail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/toyota-financial-services-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/toyota-financial-services-case.png</image:loc><image:caption>toyotafinancialservicescase</image:caption><image:title>toyotafinancialservicescase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-operational-issues-of-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-operational-issues-of-zero-trust.webp</image:loc><image:caption>theoperationalissuesofzerotrust</image:caption><image:title>theoperationalissuesofzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-meet-up-202301</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2022-12-21</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/digitalizing-optimizing-business-processes-20240918</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/digitalizing-optimizing-business-processes-20240918.webp</image:loc><image:caption>digitalizingoptimizingbusinessprocesses20240918</image:caption><image:title>digitalizingoptimizingbusinessprocesses20240918</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/20210708-review-your-security-settings</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cloud-security.jp/resource/the-replacement-cloud</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-replacement-cloud-01.png</image:loc><image:caption>thereplacementcloud01</image:caption><image:title>thereplacementcloud01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-replacement-cloud.png</image:loc><image:caption>thereplacementcloud</image:caption><image:title>thereplacementcloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-replacement-cloud-02.png</image:loc><image:caption>thereplacementcloud02</image:caption><image:title>thereplacementcloud02</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-for-remote-work</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-for-remote-work.webp</image:loc><image:caption>securityforremotework</image:caption><image:title>securityforremotework</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-a-security-cloud</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-04.webp</image:loc><image:caption>whatisasecuritycloud04</image:caption><image:title>whatisasecuritycloud04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-01.webp</image:loc><image:caption>whatisasecuritycloud01</image:caption><image:title>whatisasecuritycloud01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-03.webp</image:loc><image:caption>whatisasecuritycloud03</image:caption><image:title>whatisasecuritycloud03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-08.webp</image:loc><image:caption>whatisasecuritycloud08</image:caption><image:title>whatisasecuritycloud08</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/office365-security-risk.webp</image:loc><image:caption>office365securityrisk</image:caption><image:title>office365securityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-07.webp</image:loc><image:caption>whatisasecuritycloud07</image:caption><image:title>whatisasecuritycloud07</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-06.webp</image:loc><image:caption>whatisasecuritycloud06</image:caption><image:title>whatisasecuritycloud06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-02.webp</image:loc><image:caption>whatisasecuritycloud02</image:caption><image:title>whatisasecuritycloud02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud-05.webp</image:loc><image:caption>whatisasecuritycloud05</image:caption><image:title>whatisasecuritycloud05</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/itmedia-20240301</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/itmedia-20240301.png</image:loc><image:caption>itmedia20240301</image:caption><image:title>itmedia20240301</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/single-sign-on</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/single-sign-on-1.webp</image:loc><image:caption>singlesignon1</image:caption><image:title>singlesignon1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/single-sign-on.webp</image:loc><image:caption>singlesignon</image:caption><image:title>singlesignon</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/methods-file-sharing</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/methods-file-sharing-3.webp</image:loc><image:caption>methodsfilesharing3</image:caption><image:title>methodsfilesharing3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/methods-file-sharing-1-2.webp</image:loc><image:caption>methodsfilesharing12</image:caption><image:title>methodsfilesharing12</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/safe-and-secure-remote-work-webinar-20210526</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-share-onedrive-outside-the-company</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-10.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany10</image:caption><image:title>howtoshareonedriveoutsidethecompany10</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-05.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany05</image:caption><image:title>howtoshareonedriveoutsidethecompany05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-07.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany07</image:caption><image:title>howtoshareonedriveoutsidethecompany07</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-09.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany09</image:caption><image:title>howtoshareonedriveoutsidethecompany09</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-06.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany06</image:caption><image:title>howtoshareonedriveoutsidethecompany06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-02.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany02</image:caption><image:title>howtoshareonedriveoutsidethecompany02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-04.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany04</image:caption><image:title>howtoshareonedriveoutsidethecompany04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-01.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany01</image:caption><image:title>howtoshareonedriveoutsidethecompany01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-03.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany03</image:caption><image:title>howtoshareonedriveoutsidethecompany03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany</image:caption><image:title>howtoshareonedriveoutsidethecompany</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-share-onedrive-outside-the-company-08.webp</image:loc><image:caption>howtoshareonedriveoutsidethecompany08</image:caption><image:title>howtoshareonedriveoutsidethecompany08</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-idaas</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idaas.webp</image:loc><image:caption>whatisidaas</image:caption><image:title>whatisidaas</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-default-in-azure-ad</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-default-in-azure-ad-1.webp</image:loc><image:caption>securitydefaultinazuread1</image:caption><image:title>securitydefaultinazuread1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-default-in-azure-ad.webp</image:loc><image:caption>securitydefaultinazuread</image:caption><image:title>securitydefaultinazuread</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/when-using-microsoft-teams</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/when-using-microsoft-teams.webp</image:loc><image:caption>whenusingmicrosoftteams</image:caption><image:title>whenusingmicrosoftteams</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/vpn-to-secure-saas-20200728</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/icon/value-statement-bg.jpg</image:loc><image:caption>valuestatementbg</image:caption><image:title>valuestatementbg</image:title></image:image><lastmod>2020-07-07</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-internet-breakout</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-internet-breakout.webp</image:loc><image:caption>whatisinternetbreakout</image:caption><image:title>whatisinternetbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/solution/id-management</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/solution-banner.jpg</image:loc><image:caption>solutionbanner</image:caption><image:title>solutionbanner</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/measures-against-unauthorized-access.png</image:loc><image:caption>measuresagainstunauthorizedaccess</image:caption><image:title>measuresagainstunauthorizedaccess</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/sso.png</image:loc><image:caption>sso</image:caption><image:title>sso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-one.webp</image:loc><image:caption>henngeone</image:caption><image:title>henngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/shutterstock_1022439421%20(1).jpg</image:loc><image:caption>shutterstock10224394211</image:caption><image:title>shutterstock10224394211</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/remote-work-icon.png</image:loc><image:caption>remoteworkicon</image:caption><image:title>remoteworkicon</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/sanrio-case.png</image:loc><image:caption>sanriocase</image:caption><image:title>sanriocase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/secure-access.png</image:loc><image:caption>secureaccess</image:caption><image:title>secureaccess</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/identity.jpg</image:loc><image:caption>identity</image:caption><image:title>identity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/id-management-icon.png</image:loc><image:caption>idmanagementicon</image:caption><image:title>idmanagementicon</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/identity-lifecycle-management.png</image:loc><image:caption>identitylifecyclemanagement</image:caption><image:title>identitylifecyclemanagement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/saas-service.png</image:loc><image:caption>saasservice</image:caption><image:title>saasservice</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/multi-factor-authentication.png</image:loc><image:caption>multifactorauthentication</image:caption><image:title>multifactorauthentication</image:title></image:image><lastmod>2024-07-24</lastmod></url><url><loc>https://www.cloud-security.jp/resource/case-studies</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/case-studies-01.png</image:loc><image:caption>casestudies01</image:caption><image:title>casestudies01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/case-studies-02.png</image:loc><image:caption>casestudies02</image:caption><image:title>casestudies02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/case-studies.png</image:loc><image:caption>casestudies</image:caption><image:title>casestudies</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/blog/point-azure-active-dirctory</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/point-azure-active-dirctory.webp</image:loc><image:caption>pointazureactivedirctory</image:caption><image:title>pointazureactivedirctory</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/file-transfer-service</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/file-transfer-service.webp</image:loc><image:caption>filetransferservice</image:caption><image:title>filetransferservice</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-sso-integration</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration-01.webp</image:loc><image:caption>whatssointegration01</image:caption><image:title>whatssointegration01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration-04.webp</image:loc><image:caption>whatssointegration04</image:caption><image:title>whatssointegration04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap.webp</image:loc><image:caption>whatisiap</image:caption><image:title>whatisiap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration-03.webp</image:loc><image:caption>whatssointegration03</image:caption><image:title>whatssointegration03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration-05.webp</image:loc><image:caption>whatssointegration05</image:caption><image:title>whatssointegration05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration-02.webp</image:loc><image:caption>whatssointegration02</image:caption><image:title>whatssointegration02</image:title></image:image><lastmod>2025-04-14</lastmod></url><url><loc>https://www.cloud-security.jp/news/galileopt-dx</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/galileopt-dx.jpg</image:loc><image:caption>galileoptdx</image:caption><image:title>galileoptdx</image:title></image:image><lastmod>2024-05-30</lastmod></url><url><loc>https://www.cloud-security.jp/news/ricoh-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/ricoh-x-hennge.jpeg</image:loc><image:caption>ricohxhennge</image:caption><image:title>ricohxhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/resource/hennge-in-the-financial-industry</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-in-the-financial-industry.png</image:loc><image:caption>henngeinthefinancialindustry</image:caption><image:title>henngeinthefinancialindustry</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-in-the-financial-industry-02.png</image:loc><image:caption>henngeinthefinancialindustry02</image:caption><image:title>henngeinthefinancialindustry02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-in-the-financial-industry-01.png</image:loc><image:caption>henngeinthefinancialindustry01</image:caption><image:title>henngeinthefinancialindustry01</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/20240215_sbbit</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-02-08</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-security-quality-of-the-ppap-method</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-security-quality-of-the-ppap-method.webp</image:loc><image:caption>thesecurityqualityoftheppapmethod</image:caption><image:title>thesecurityqualityoftheppapmethod</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/ppap-prohibited</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/ppap-prohibited.webp</image:loc><image:caption>ppapprohibited</image:caption><image:title>ppapprohibited</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-rocket-pitch-202503</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/daiwabo-information-system-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/daiwabo-information-system-case.png</image:loc><image:caption>daiwaboinformationsystemcase</image:caption><image:title>daiwaboinformationsystemcase</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-cloud-waf</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-waf.webp</image:loc><image:caption>whatiscloudwaf</image:caption><image:title>whatiscloudwaf</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/cloud-mail-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cloud-mail-security.webp</image:loc><image:caption>cloudmailsecurity</image:caption><image:title>cloudmailsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/teamsprit-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/teamsprit-x-henngeone.jpeg</image:loc><image:caption>teamspritxhenngeone</image:caption><image:title>teamspritxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-information-security-incident</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-05.webp</image:loc><image:caption>whatisinformationsecurityincident05</image:caption><image:title>whatisinformationsecurityincident05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-03.webp</image:loc><image:caption>whatisinformationsecurityincident03</image:caption><image:title>whatisinformationsecurityincident03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident.webp</image:loc><image:caption>whatisinformationsecurityincident</image:caption><image:title>whatisinformationsecurityincident</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-06.webp</image:loc><image:caption>whatisinformationsecurityincident06</image:caption><image:title>whatisinformationsecurityincident06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-01.webp</image:loc><image:caption>whatisinformationsecurityincident01</image:caption><image:title>whatisinformationsecurityincident01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-02.webp</image:loc><image:caption>whatisinformationsecurityincident02</image:caption><image:title>whatisinformationsecurityincident02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-04.webp</image:loc><image:caption>whatisinformationsecurityincident04</image:caption><image:title>whatisinformationsecurityincident04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-08.webp</image:loc><image:caption>whatisinformationsecurityincident08</image:caption><image:title>whatisinformationsecurityincident08</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-information-security-incident-07.webp</image:loc><image:caption>whatisinformationsecurityincident07</image:caption><image:title>whatisinformationsecurityincident07</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/why-does-soken-raise-the-issue-about-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/why-does-soken-raise-the-issue-about-ppap.webp</image:loc><image:caption>whydoessokenraisetheissueaboutppap</image:caption><image:title>whydoessokenraisetheissueaboutppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-realize-sso-on-google-gsuite</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-realize-sso-on-google-gsuite.webp</image:loc><image:caption>howtorealizessoongooglegsuite</image:caption><image:title>howtorealizessoongooglegsuite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-sso.webp</image:loc><image:caption>whatissso</image:caption><image:title>whatissso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-websso.webp</image:loc><image:caption>whatiswebsso</image:caption><image:title>whatiswebsso</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/geniee-sfacrm-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/geniee-sfacrm-x-hennge.png</image:loc><image:caption>genieesfacrmxhennge</image:caption><image:title>genieesfacrmxhennge</image:title></image:image><lastmod>2023-10-25</lastmod></url><url><loc>https://www.cloud-security.jp/blog/cloud-mail-security-service</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cloud-mail-security-service.webp</image:loc><image:caption>cloudmailsecurityservice</image:caption><image:title>cloudmailsecurityservice</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/cloud-security-measures-seminar-20230413</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://www.cloud-security.jp/resource/shizuoka-gas-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/shizuoka-gas-case.png</image:loc><image:caption>shizuokagascase</image:caption><image:title>shizuokagascase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-03-16</lastmod></url><url><loc>https://www.cloud-security.jp/blog/explanation-importance-of-email-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/explanation-importance-of-email-security-1.webp</image:loc><image:caption>explanationimportanceofemailsecurity1</image:caption><image:title>explanationimportanceofemailsecurity1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/explanation-importance-of-email-security.webp</image:loc><image:caption>explanationimportanceofemailsecurity</image:caption><image:title>explanationimportanceofemailsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-one-trial-seminar</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/takagi.jpeg</image:loc><image:caption>takagi</image:caption><image:title>takagi</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/yamauchi.jpeg</image:loc><image:caption>yamauchi</image:caption><image:title>yamauchi</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/hidaka.jpeg</image:loc><image:caption>hidaka</image:caption><image:title>hidaka</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/hennge-one-trial-seminar.png</image:loc><image:caption>henngeonetrialseminar</image:caption><image:title>henngeonetrialseminar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-10-23</lastmod></url><url><loc>https://www.cloud-security.jp/news/talentpalette-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/talentpalette-x-henngeone.png</image:loc><image:caption>talentpalettexhenngeone</image:caption><image:title>talentpalettexhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-07-22</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-meet-up-202302</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2022-12-21</lastmod></url><url><loc>https://www.cloud-security.jp/blog/difference-multi-factor-authentication-and-2step-authentication</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-multi-factor-authentication-and-2step-authentication.webp</image:loc><image:caption>differencemultifactorauthenticationand2stepauthentication</image:caption><image:title>differencemultifactorauthenticationand2stepauthentication</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-s-mime</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-01.webp</image:loc><image:caption>whatissmime01</image:caption><image:title>whatissmime01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-10.webp</image:loc><image:caption>whatissmime10</image:caption><image:title>whatissmime10</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-08.webp</image:loc><image:caption>whatissmime08</image:caption><image:title>whatissmime08</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime.webp</image:loc><image:caption>whatissmime</image:caption><image:title>whatissmime</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-02.webp</image:loc><image:caption>whatissmime02</image:caption><image:title>whatissmime02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-06.webp</image:loc><image:caption>whatissmime06</image:caption><image:title>whatissmime06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-05.webp</image:loc><image:caption>whatissmime05</image:caption><image:title>whatissmime05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-04.webp</image:loc><image:caption>whatissmime04</image:caption><image:title>whatissmime04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-03.webp</image:loc><image:caption>whatissmime03</image:caption><image:title>whatissmime03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-09.webp</image:loc><image:caption>whatissmime09</image:caption><image:title>whatissmime09</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime-07.webp</image:loc><image:caption>whatissmime07</image:caption><image:title>whatissmime07</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-ministry-of-internal-affairs-and-communications</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-ministry-of-internal-affairs-and-communications.webp</image:loc><image:caption>theministryofinternalaffairsandcommunications</image:caption><image:title>theministryofinternalaffairsandcommunications</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/telework-security-guidelines</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/telework-security-guidelines-02.png</image:loc><image:caption>teleworksecurityguidelines02</image:caption><image:title>teleworksecurityguidelines02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/telework-security-guidelines.png</image:loc><image:caption>teleworksecurityguidelines</image:caption><image:title>teleworksecurityguidelines</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/telework-security-guidelines-01.png</image:loc><image:caption>teleworksecurityguidelines01</image:caption><image:title>teleworksecurityguidelines01</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/information-security-management-forum-2024-summer-20240618</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/zero-trust-security-complete-guide</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-security-complete-guide.png</image:loc><image:caption>zerotrustsecuritycompleteguide</image:caption><image:title>zerotrustsecuritycompleteguide</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-security-complete-guide-02.png</image:loc><image:caption>zerotrustsecuritycompleteguide02</image:caption><image:title>zerotrustsecuritycompleteguide02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-security-complete-guide-01.png</image:loc><image:caption>zerotrustsecuritycompleteguide01</image:caption><image:title>zerotrustsecuritycompleteguide01</image:title></image:image><lastmod>2025-02-12</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-saml</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap.webp</image:loc><image:caption>whatisiap</image:caption><image:title>whatisiap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-saml-02.webp</image:loc><image:caption>whatissaml02</image:caption><image:title>whatissaml02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-saml-01.webp</image:loc><image:caption>whatissaml01</image:caption><image:title>whatissaml01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-saml-03.webp</image:loc><image:caption>whatissaml03</image:caption><image:title>whatissaml03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/basic-knowledge-of-cloud-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security-02.webp</image:loc><image:caption>basicknowledgeofcloudsecurity02</image:caption><image:title>basicknowledgeofcloudsecurity02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/office365-security-risk.webp</image:loc><image:caption>office365securityrisk</image:caption><image:title>office365securityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security-03.webp</image:loc><image:caption>basicknowledgeofcloudsecurity03</image:caption><image:title>basicknowledgeofcloudsecurity03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security-04.webp</image:loc><image:caption>basicknowledgeofcloudsecurity04</image:caption><image:title>basicknowledgeofcloudsecurity04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security-01.webp</image:loc><image:caption>basicknowledgeofcloudsecurity01</image:caption><image:title>basicknowledgeofcloudsecurity01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/implemented-at-salesforce-com</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/implemented-at-salesforce-com.png</image:loc><image:caption>implementedatsalesforcecom</image:caption><image:title>implementedatsalesforcecom</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/implemented-at-salesforce-com-02.png</image:loc><image:caption>implementedatsalesforcecom02</image:caption><image:title>implementedatsalesforcecom02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/implemented-at-salesforce-com-01.png</image:loc><image:caption>implementedatsalesforcecom01</image:caption><image:title>implementedatsalesforcecom01</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/jsf-20240219</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-02-08</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-mdm</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-mdm.webp</image:loc><image:caption>whatismdm</image:caption><image:title>whatismdm</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-mdm-1.webp</image:loc><image:caption>whatismdm1</image:caption><image:title>whatismdm1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/machida-city-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/machida-city-case.png</image:loc><image:caption>machidacitycase</image:caption><image:title>machidacitycase</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/atlassian-hennge-collabo-webinar-20200909</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2020-08-13</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-iap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap.webp</image:loc><image:caption>whatisiap</image:caption><image:title>whatisiap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-05.webp</image:loc><image:caption>whatisiap05</image:caption><image:title>whatisiap05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-03.webp</image:loc><image:caption>whatisiap03</image:caption><image:title>whatisiap03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-02.webp</image:loc><image:caption>whatisiap02</image:caption><image:title>whatisiap02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-04.webp</image:loc><image:caption>whatisiap04</image:caption><image:title>whatisiap04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-08.webp</image:loc><image:caption>whatisiap08</image:caption><image:title>whatisiap08</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-01.webp</image:loc><image:caption>whatisiap01</image:caption><image:title>whatisiap01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-06.webp</image:loc><image:caption>whatisiap06</image:caption><image:title>whatisiap06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap-07.webp</image:loc><image:caption>whatisiap07</image:caption><image:title>whatisiap07</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-functions-and-types-ips</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-functions-and-types-ips.webp</image:loc><image:caption>thefunctionsandtypesips</image:caption><image:title>thefunctionsandtypesips</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/5-corporate-cases-information-leaks</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks-05.webp</image:loc><image:caption>5corporatecasesinformationleaks05</image:caption><image:title>5corporatecasesinformationleaks05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks-06.webp</image:loc><image:caption>5corporatecasesinformationleaks06</image:caption><image:title>5corporatecasesinformationleaks06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks-04.webp</image:loc><image:caption>5corporatecasesinformationleaks04</image:caption><image:title>5corporatecasesinformationleaks04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks-01.webp</image:loc><image:caption>5corporatecasesinformationleaks01</image:caption><image:title>5corporatecasesinformationleaks01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks-02.webp</image:loc><image:caption>5corporatecasesinformationleaks02</image:caption><image:title>5corporatecasesinformationleaks02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails.webp</image:loc><image:caption>targetedattackemails</image:caption><image:title>targetedattackemails</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks-03.webp</image:loc><image:caption>5corporatecasesinformationleaks03</image:caption><image:title>5corporatecasesinformationleaks03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-01.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware01</image:caption><image:title>howtocheckcomputerinfectedmalware01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools.webp</image:loc><image:caption>7visualizationtools</image:caption><image:title>7visualizationtools</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks.webp</image:loc><image:caption>whattrainingtargetedemailattacks</image:caption><image:title>whattrainingtargetedemailattacks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks.webp</image:loc><image:caption>5corporatecasesinformationleaks</image:caption><image:title>5corporatecasesinformationleaks</image:title></image:image><lastmod>2025-05-01</lastmod></url><url><loc>https://www.cloud-security.jp/blog/telework-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/telework-security.webp</image:loc><image:caption>teleworksecurity</image:caption><image:title>teleworksecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/box-onedrive-comparison</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/targets-emotet-preparation-and-future-email-standards-20220525</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2022-05-12</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-satellite-office-sso</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-satellite-office-sso.webp</image:loc><image:caption>whatissatelliteofficesso</image:caption><image:title>whatissatelliteofficesso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-exhibits-at-edix-tokyo-20240508</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-conduct-sso-on-office365</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-conduct-sso-on-office365.webp</image:loc><image:caption>howtoconductssoonoffice365</image:caption><image:title>howtoconductssoonoffice365</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-are-malware-and-ransomware</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-are-malware-and-ransomware-1.webp</image:loc><image:caption>whataremalwareandransomware1</image:caption><image:title>whataremalwareandransomware1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-are-malware-and-ransomware.webp</image:loc><image:caption>whataremalwareandransomware</image:caption><image:title>whataremalwareandransomware</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/how-companies-should-start-zerotrust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/how-companies-should-start-zerotrust-02.png</image:loc><image:caption>howcompaniesshouldstartzerotrust02</image:caption><image:title>howcompaniesshouldstartzerotrust02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/how-companies-should-start-zerotrust.png</image:loc><image:caption>howcompaniesshouldstartzerotrust</image:caption><image:title>howcompaniesshouldstartzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/how-companies-should-start-zerotrust-01.png</image:loc><image:caption>howcompaniesshouldstartzerotrust01</image:caption><image:title>howcompaniesshouldstartzerotrust01</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/online-meeting</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/overlay-bg.webp</image:loc><image:caption>overlaybg</image:caption><image:title>overlaybg</image:title></image:image><lastmod>2023-06-21</lastmod></url><url><loc>https://www.cloud-security.jp/resource/sanrio-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/sanrio-case.png</image:loc><image:caption>sanriocase</image:caption><image:title>sanriocase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-features-of-line-works</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-features-of-line-works-3.webp</image:loc><image:caption>securityfeaturesoflineworks3</image:caption><image:title>securityfeaturesoflineworks3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-features-of-line-works-1.webp</image:loc><image:caption>securityfeaturesoflineworks1</image:caption><image:title>securityfeaturesoflineworks1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-features-of-line-works-2.webp</image:loc><image:caption>securityfeaturesoflineworks2</image:caption><image:title>securityfeaturesoflineworks2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-features-of-line-works.webp</image:loc><image:caption>securityfeaturesoflineworks</image:caption><image:title>securityfeaturesoflineworks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-features-of-line-works-4.webp</image:loc><image:caption>securityfeaturesoflineworks4</image:caption><image:title>securityfeaturesoflineworks4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/interplay-cloud-shift-20240910</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-meet-up-2022</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-one-experience-seminar-20220616</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-netskope</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-netskope.webp</image:loc><image:caption>whatisnetskope</image:caption><image:title>whatisnetskope</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-ppap-problem</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-ppap-problem.webp</image:loc><image:caption>theppapproblem</image:caption><image:title>theppapproblem</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/office365-security-risk</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/office365-security-risk-01.webp</image:loc><image:caption>office365securityrisk01</image:caption><image:title>office365securityrisk01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/office365-security-risk.webp</image:loc><image:caption>office365securityrisk</image:caption><image:title>office365securityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/dialpad-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/dialpad-x-henngeone.png</image:loc><image:caption>dialpadxhenngeone</image:caption><image:title>dialpadxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-07-22</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/secure-file</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-02-09</lastmod></url><url><loc>https://www.cloud-security.jp/news/majorflow-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/%E3%82%B9%E3%82%AF%E3%83%AA%E3%83%BC%E3%83%B3%E3%82%B7%E3%83%A7%E3%83%83%E3%83%88%202024-02-08%20104145.png</image:loc><image:caption>スクリーンショット20240208104145</image:caption><image:title>スクリーンショット20240208104145</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-03-05</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/cybersecurity-threats-seminar-20240305</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/improving-efficiency-from-information-systems</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/improving-efficiency-from-information-systems.jpeg</image:loc><image:caption>improvingefficiencyfrominformationsystems</image:caption><image:title>improvingefficiencyfrominformationsystems</image:title></image:image><lastmod>2023-11-20</lastmod></url><url><loc>https://www.cloud-security.jp/blog/google-cloud-platform-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/google-cloud-platform-security.webp</image:loc><image:caption>googlecloudplatformsecurity</image:caption><image:title>googlecloudplatformsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/cloudsign-rechange-japan-2023-autumn-20230914</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-09-07</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-risks-of-cloud-storage</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-risks-of-cloud-storage-1.webp</image:loc><image:caption>securityrisksofcloudstorage1</image:caption><image:title>securityrisksofcloudstorage1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-risks-of-cloud-storage.webp</image:loc><image:caption>securityrisksofcloudstorage</image:caption><image:title>securityrisksofcloudstorage</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/mail-security-of-microsoft-365</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/mail-security-of-microsoft-365.webp</image:loc><image:caption>mailsecurityofmicrosoft365</image:caption><image:title>mailsecurityofmicrosoft365</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-hennge-email-dlp.webp</image:loc><image:caption>whatishenngeemaildlp</image:caption><image:title>whatishenngeemaildlp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/sonicwall-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/sonicwall-x-hennge.webp</image:loc><image:caption>sonicwallxhennge</image:caption><image:title>sonicwallxhennge</image:title></image:image><lastmod>2024-07-25</lastmod></url><url><loc>https://www.cloud-security.jp/blog/retail-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/retail-security.webp</image:loc><image:caption>retailsecurity</image:caption><image:title>retailsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/what-will-you-do-de-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-will-you-do-de-ppap-02.png</image:loc><image:caption>whatwillyoudodeppap02</image:caption><image:title>whatwillyoudodeppap02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-will-you-do-de-ppap.png</image:loc><image:caption>whatwillyoudodeppap</image:caption><image:title>whatwillyoudodeppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-will-you-do-de-ppap-01.png</image:loc><image:caption>whatwillyoudodeppap01</image:caption><image:title>whatwillyoudodeppap01</image:title></image:image><lastmod>2025-02-14</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-the-ppap-protocol</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-the-ppap-protocol.webp</image:loc><image:caption>whatistheppapprotocol</image:caption><image:title>whatistheppapprotocol</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/explaining-importance-virus-checking-zip-files</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files-02.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles02</image:caption><image:title>explainingimportanceviruscheckingzipfiles02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files-05.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles05</image:caption><image:title>explainingimportanceviruscheckingzipfiles05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files-04.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles04</image:caption><image:title>explainingimportanceviruscheckingzipfiles04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files-03.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles03</image:caption><image:title>explainingimportanceviruscheckingzipfiles03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files-01.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles01</image:caption><image:title>explainingimportanceviruscheckingzipfiles01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/box-cloud</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-cloud.webp</image:loc><image:caption>boxcloud</image:caption><image:title>boxcloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/microsoft-teams-20200721</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/what-is-cloud-security.jpg</image:loc><image:caption>whatiscloudsecurity</image:caption><image:title>whatiscloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2020-07-07</lastmod></url><url><loc>https://www.cloud-security.jp/blog/ppap-is-dangerous</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/ppap-is-dangerous.webp</image:loc><image:caption>ppapisdangerous</image:caption><image:title>ppapisdangerous</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/cocomite-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/cocomite-x-henngeone-seminar.jpeg</image:loc><image:caption>cocomitexhenngeoneseminar</image:caption><image:title>cocomitexhenngeoneseminar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-10-23</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-difference-and-necessity-epp</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-difference-and-necessity-epp.webp</image:loc><image:caption>thedifferenceandnecessityepp</image:caption><image:title>thedifferenceandnecessityepp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/single-sign-on-tool</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/single-sign-on-tool.webp</image:loc><image:caption>singlesignontool</image:caption><image:title>singlesignontool</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/single-sign-on-tool-1.webp</image:loc><image:caption>singlesignontool1</image:caption><image:title>singlesignontool1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/the-key-to-building-a-zero-trust-network</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-key-to-building-a-zero-trust-network.png</image:loc><image:caption>thekeytobuildingazerotrustnetwork</image:caption><image:title>thekeytobuildingazerotrustnetwork</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-key-to-building-a-zero-trust-network-01.png</image:loc><image:caption>thekeytobuildingazerotrustnetwork01</image:caption><image:title>thekeytobuildingazerotrustnetwork01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-key-to-building-a-zero-trust-network-02.png</image:loc><image:caption>thekeytobuildingazerotrustnetwork02</image:caption><image:title>thekeytobuildingazerotrustnetwork02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/blog/erroneous-transmission-of-mail</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/erroneous-transmission-of-mail-3.webp</image:loc><image:caption>erroneoustransmissionofmail3</image:caption><image:title>erroneoustransmissionofmail3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/erroneous-transmission-of-mail.webp</image:loc><image:caption>erroneoustransmissionofmail</image:caption><image:title>erroneoustransmissionofmail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/erroneous-transmission-of-mail-2.webp</image:loc><image:caption>erroneoustransmissionofmail2</image:caption><image:title>erroneoustransmissionofmail2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/erroneous-transmission-of-mail-1.webp</image:loc><image:caption>erroneoustransmissionofmail1</image:caption><image:title>erroneoustransmissionofmail1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/recommending-composable-architecture</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/recommending-composable-architecture.webp</image:loc><image:caption>recommendingcomposablearchitecture</image:caption><image:title>recommendingcomposablearchitecture</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/books-to-learn-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/books-to-learn-zero-trust.webp</image:loc><image:caption>bookstolearnzerotrust</image:caption><image:title>bookstolearnzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/receptionist-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/receptionist-x-henngeone.jpeg</image:loc><image:caption>receptionistxhenngeone</image:caption><image:title>receptionistxhenngeone</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/limit-with-vpn</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/limit-with-vpn-1.webp</image:loc><image:caption>limitwithvpn1</image:caption><image:title>limitwithvpn1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/limit-with-vpn.webp</image:loc><image:caption>limitwithvpn</image:caption><image:title>limitwithvpn</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/20210805_salesforce</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2021-07-21</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-points-of-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-points-of-zero-trust.webp</image:loc><image:caption>thepointsofzerotrust</image:caption><image:title>thepointsofzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/zero-trust-japanese-government</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/zero-trust-japanese-government.webp</image:loc><image:caption>zerotrustjapanesegovernment</image:caption><image:title>zerotrustjapanesegovernment</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-10threats</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-10threats.webp</image:loc><image:caption>security10threats</image:caption><image:title>security10threats</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/findy-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/findy-x-henngeone.png</image:loc><image:caption>findyxhenngeone</image:caption><image:title>findyxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-05-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-cloud-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security.webp</image:loc><image:caption>whatiscloudsecurity</image:caption><image:title>whatiscloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/zero-trust-encyclopedia</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/zero-trust-encyclopedia.webp</image:loc><image:caption>zerotrustencyclopedia</image:caption><image:title>zerotrustencyclopedia</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/zero-trust-encyclopedia-1.webp</image:loc><image:caption>zerotrustencyclopedia1</image:caption><image:title>zerotrustencyclopedia1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-hybrid-work</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-hybrid-work.webp</image:loc><image:caption>whatishybridwork</image:caption><image:title>whatishybridwork</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-hybrid-work-1.webp</image:loc><image:caption>whatishybridwork1</image:caption><image:title>whatishybridwork1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-implementation-method-and-the-difference</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-implementation-method-and-the-difference.webp</image:loc><image:caption>theimplementationmethodandthedifference</image:caption><image:title>theimplementationmethodandthedifference</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/idp-edition</loc><video:video><video:thumbnail_loc>https://www.cloud-security.jp/hubfs/200526_HENNGE%20One%E7%B4%B9%E4%BB%8B%E5%8B%95%E7%94%BB.mp4/medium.jpg</video:thumbnail_loc><video:title>200526_HENNGE One紹介動画</video:title><video:description>200526_HENNGE One紹介動画</video:description><video:content_loc>https://www.cloud-security.jp/hubfs/200526_HENNGE%20One%E7%B4%B9%E4%BB%8B%E5%8B%95%E7%94%BB.mp4</video:content_loc><video:duration>101</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-access.svg</image:loc><image:caption>iconaccess</image:caption><image:title>iconaccess</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/what-is-network-security.jpg</image:loc><image:caption>whatisnetworksecurity</image:caption><image:title>whatisnetworksecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-multiapp.svg</image:loc><image:caption>iconmultiapp</image:caption><image:title>iconmultiapp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-activea.svg</image:loc><image:caption>iconactivea</image:caption><image:title>iconactivea</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-sso.svg</image:loc><image:caption>iconsso</image:caption><image:title>iconsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-accesslog.svg</image:loc><image:caption>iconaccesslog</image:caption><image:title>iconaccesslog</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/shutterstock_1342625936%20(1).jpg</image:loc><image:caption>shutterstock13426259361</image:caption><image:title>shutterstock13426259361</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-secureb.svg</image:loc><image:caption>iconsecureb</image:caption><image:title>iconsecureb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/idp.jpeg</image:loc><image:caption>idp</image:caption><image:title>idp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-idpass.svg</image:loc><image:caption>iconidpass</image:caption><image:title>iconidpass</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/Hennge-one-support.svg</image:loc><image:caption>Henngeonesupport</image:caption><image:title>Henngeonesupport</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-device.svg</image:loc><image:caption>icondevice</image:caption><image:title>icondevice</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/the-mail-wise-functions-and-security-measures-provided.jpg</image:loc><image:caption>themailwisefunctionsandsecuritymeasuresprovided</image:caption><image:title>themailwisefunctionsandsecuritymeasuresprovided</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image01.jpg</image:loc><image:caption>image01</image:caption><image:title>image01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image-hero-v3.webp</image:loc><image:caption>imageherov3</image:caption><image:title>imageherov3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-passless.svg</image:loc><image:caption>iconpassless</image:caption><image:title>iconpassless</image:title></image:image><lastmod>2024-06-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/tsuzuki-electric-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/tsuzuki-electric-case.png</image:loc><image:caption>tsuzukielectriccase</image:caption><image:title>tsuzukielectriccase</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/resource/microsoft-teams</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/microsoft-teams-01.png</image:loc><image:caption>microsoftteams01</image:caption><image:title>microsoftteams01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/microsoft-teams-02.png</image:loc><image:caption>microsoftteams02</image:caption><image:title>microsoftteams02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/microsoft-teams.png</image:loc><image:caption>microsoftteams</image:caption><image:title>microsoftteams</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/online-storage-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/online-storage-security.webp</image:loc><image:caption>onlinestoragesecurity</image:caption><image:title>onlinestoragesecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-zscaler</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/the-spread-of-remote-work.jpg</image:loc><image:caption>thespreadofremotework</image:caption><image:title>thespreadofremotework</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/security-features-of-line-works.jpg</image:loc><image:caption>securityfeaturesoflineworks</image:caption><image:title>securityfeaturesoflineworks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/limit-with-vpn.webp</image:loc><image:caption>limitwithvpn</image:caption><image:title>limitwithvpn</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/summary-security-measures-to-take-using-google-drive.jpg</image:loc><image:caption>summarysecuritymeasurestotakeusinggoogledrive</image:caption><image:title>summarysecuritymeasurestotakeusinggoogledrive</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/cloud-security-anxiety</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cloud-security-anxiety.webp</image:loc><image:caption>cloudsecurityanxiety</image:caption><image:title>cloudsecurityanxiety</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/things-to-do-bofore-constructiong-zero-trust-architecture</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/things-to-do-bofore-constructiong-zero-trust-architecture.webp</image:loc><image:caption>thingstodoboforeconstructiongzerotrustarchitecture</image:caption><image:title>thingstodoboforeconstructiongzerotrustarchitecture</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-mail-archiving</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-mail-archiving-4.webp</image:loc><image:caption>whatismailarchiving4</image:caption><image:title>whatismailarchiving4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-mail-archiving-1-2.webp</image:loc><image:caption>whatismailarchiving12</image:caption><image:title>whatismailarchiving12</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-mail-archiving-2-2.webp</image:loc><image:caption>whatismailarchiving22</image:caption><image:title>whatismailarchiving22</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/atled-expo-2024</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/atled-expo-2024.png</image:loc><image:caption>atledexpo2024</image:caption><image:title>atledexpo2024</image:title></image:image><lastmod>2023-12-12</lastmod></url><url><loc>https://www.cloud-security.jp/resource/choose-hennge-one</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/choose-hennge-one-02.png</image:loc><image:caption>choosehenngeone02</image:caption><image:title>choosehenngeone02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/choose-hennge-one.png</image:loc><image:caption>choosehenngeone</image:caption><image:title>choosehenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/choose-hennge-one-01.png</image:loc><image:caption>choosehenngeone01</image:caption><image:title>choosehenngeone01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/kintone-security-level</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/kintone-security-level.webp</image:loc><image:caption>kintonesecuritylevel</image:caption><image:title>kintonesecuritylevel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/groupware-security-measures</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/groupware-security-measures.webp</image:loc><image:caption>groupwaresecuritymeasures</image:caption><image:title>groupwaresecuritymeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/groupware-security-measures-1.webp</image:loc><image:caption>groupwaresecuritymeasures1</image:caption><image:title>groupwaresecuritymeasures1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-vpn-removal</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal.webp</image:loc><image:caption>whatisvpnremoval</image:caption><image:title>whatisvpnremoval</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal-04.webp</image:loc><image:caption>whatisvpnremoval04</image:caption><image:title>whatisvpnremoval04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal-01.webp</image:loc><image:caption>whatisvpnremoval01</image:caption><image:title>whatisvpnremoval01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal-05.webp</image:loc><image:caption>whatisvpnremoval05</image:caption><image:title>whatisvpnremoval05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal-06.webp</image:loc><image:caption>whatisvpnremoval06</image:caption><image:title>whatisvpnremoval06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal-02.webp</image:loc><image:caption>whatisvpnremoval02</image:caption><image:title>whatisvpnremoval02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-vpn-removal-03.webp</image:loc><image:caption>whatisvpnremoval03</image:caption><image:title>whatisvpnremoval03</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/20210929_changeleaders</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2021-08-24</lastmod></url><url><loc>https://www.cloud-security.jp/resource/sala-business-solutions-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/sala-business-solutions-case.png</image:loc><image:caption>salabusinesssolutionscase</image:caption><image:title>salabusinesssolutionscase</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/file-share-service</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/file-share-service.webp</image:loc><image:caption>fileshareservice</image:caption><image:title>fileshareservice</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/teams-webinar-20220323</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/mizobata.png</image:loc><image:caption>mizobata</image:caption><image:title>mizobata</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2022-03-09</lastmod></url><url><loc>https://www.cloud-security.jp/blog/authentication-to-prevent-unauthorized-access-microsoft365</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/authentication-to-prevent-unauthorized-access-microsoft365-03.webp</image:loc><image:caption>authenticationtopreventunauthorizedaccessmicrosoft36503</image:caption><image:title>authenticationtopreventunauthorizedaccessmicrosoft36503</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/authentication-to-prevent-unauthorized-access-microsoft365-01.webp</image:loc><image:caption>authenticationtopreventunauthorizedaccessmicrosoft36501</image:caption><image:title>authenticationtopreventunauthorizedaccessmicrosoft36501</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/office365-security-risk.webp</image:loc><image:caption>office365securityrisk</image:caption><image:title>office365securityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/authentication-to-prevent-unauthorized-access-microsoft365-04.webp</image:loc><image:caption>authenticationtopreventunauthorizedaccessmicrosoft36504</image:caption><image:title>authenticationtopreventunauthorizedaccessmicrosoft36504</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/authentication-to-prevent-unauthorized-access-microsoft365-02.webp</image:loc><image:caption>authenticationtopreventunauthorizedaccessmicrosoft36502</image:caption><image:title>authenticationtopreventunauthorizedaccessmicrosoft36502</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-fraud-triangle</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle-05.webp</image:loc><image:caption>whatisfraudtriangle05</image:caption><image:title>whatisfraudtriangle05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle-04.webp</image:loc><image:caption>whatisfraudtriangle04</image:caption><image:title>whatisfraudtriangle04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle-06.webp</image:loc><image:caption>whatisfraudtriangle06</image:caption><image:title>whatisfraudtriangle06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime.webp</image:loc><image:caption>whatissmime</image:caption><image:title>whatissmime</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle-03.webp</image:loc><image:caption>whatisfraudtriangle03</image:caption><image:title>whatisfraudtriangle03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle-02.webp</image:loc><image:caption>whatisfraudtriangle02</image:caption><image:title>whatisfraudtriangle02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle-01.webp</image:loc><image:caption>whatisfraudtriangle01</image:caption><image:title>whatisfraudtriangle01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-05-01</lastmod></url><url><loc>https://www.cloud-security.jp/about</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image-hero-v3.webp</image:loc><image:caption>imageherov3</image:caption><image:title>imageherov3</image:title></image:image><lastmod>2025-08-06</lastmod></url><url><loc>https://www.cloud-security.jp/blog/powerful-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/powerful-ppap-2.webp</image:loc><image:caption>powerfulppap2</image:caption><image:title>powerfulppap2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/powerful-ppap-1.webp</image:loc><image:caption>powerfulppap1</image:caption><image:title>powerfulppap1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/powerful-ppap.webp</image:loc><image:caption>powerfulppap</image:caption><image:title>powerfulppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/three-things-about-cloud-migration.png</image:loc><image:caption>threethingsaboutcloudmigration</image:caption><image:title>threethingsaboutcloudmigration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/complete-guide-to-certification-management-2023.png</image:loc><image:caption>completeguidetocertificationmanagement2023</image:caption><image:title>completeguidetocertificationmanagement2023</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/security-measures-take-from-cyber-attack.png</image:loc><image:caption>securitymeasurestakefromcyberattack</image:caption><image:title>securitymeasurestakefromcyberattack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/current-state-of-cyber-attacks.png</image:loc><image:caption>currentstateofcyberattacks</image:caption><image:title>currentstateofcyberattacks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/security-for-school-system.png</image:loc><image:caption>securityforschoolsystem</image:caption><image:title>securityforschoolsystem</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/fraud-triangle-and-email-management.png</image:loc><image:caption>fraudtriangleandemailmanagement</image:caption><image:title>fraudtriangleandemailmanagement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/security-measure.png</image:loc><image:caption>securitymeasure</image:caption><image:title>securitymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/security-for-construction-industry.png</image:loc><image:caption>securityforconstructionindustry</image:caption><image:title>securityforconstructionindustry</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/security-in-automobile-industry.png</image:loc><image:caption>securityinautomobileindustry</image:caption><image:title>securityinautomobileindustry</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-one-and-asteria-warp.png</image:loc><image:caption>henngeoneandasteriawarp</image:caption><image:title>henngeoneandasteriawarp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-role-of-the-cio.png</image:loc><image:caption>theroleofthecio</image:caption><image:title>theroleofthecio</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/attack-techniques-countermeasures-white-paper-2023.png</image:loc><image:caption>attacktechniquescountermeasureswhitepaper2023</image:caption><image:title>attacktechniquescountermeasureswhitepaper2023</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-will-you-do-de-ppap.png</image:loc><image:caption>whatwillyoudodeppap</image:caption><image:title>whatwillyoudodeppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/cyber-attacks-microsoft-365-email.png</image:loc><image:caption>cyberattacksmicrosoft365email</image:caption><image:title>cyberattacksmicrosoft365email</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/how-companies-should-start-zerotrust.png</image:loc><image:caption>howcompaniesshouldstartzerotrust</image:caption><image:title>howcompaniesshouldstartzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/wp-file-share-guide-2024.png</image:loc><image:caption>wpfileshareguide2024</image:caption><image:title>wpfileshareguide2024</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/use-it-during-covid-19-pandemic.png</image:loc><image:caption>useitduringcovid19pandemic</image:caption><image:title>useitduringcovid19pandemic</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/4-effective-ways-reduce-saas-costs.png</image:loc><image:caption>4effectivewaysreducesaascosts</image:caption><image:title>4effectivewaysreducesaascosts</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/keys-to-improving-labor-productivity.png</image:loc><image:caption>keystoimprovinglaborproductivity</image:caption><image:title>keystoimprovinglaborproductivity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/learn-how-to-use-dlp.png</image:loc><image:caption>learnhowtousedlp</image:caption><image:title>learnhowtousedlp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/telework-security-guidelines.png</image:loc><image:caption>teleworksecurityguidelines</image:caption><image:title>teleworksecurityguidelines</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/top-10-information-security-threats.png</image:loc><image:caption>top10informationsecuritythreats</image:caption><image:title>top10informationsecuritythreats</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-security-complete-guide.png</image:loc><image:caption>zerotrustsecuritycompleteguide</image:caption><image:title>zerotrustsecuritycompleteguide</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/giga-school-concept-security-measures.png</image:loc><image:caption>gigaschoolconceptsecuritymeasures</image:caption><image:title>gigaschoolconceptsecuritymeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/most-intrusions-from-vpn-devices.png</image:loc><image:caption>mostintrusionsfromvpndevices</image:caption><image:title>mostintrusionsfromvpndevices</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/security-measures-no-tools-required.png</image:loc><image:caption>securitymeasuresnotoolsrequired</image:caption><image:title>securitymeasuresnotoolsrequired</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/future-idaas-selection-points.png</image:loc><image:caption>futureidaasselectionpoints</image:caption><image:title>futureidaasselectionpoints</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/it-industry-and-telework.png</image:loc><image:caption>itindustryandtelework</image:caption><image:title>itindustryandtelework</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/3pitfalls-of-email-security-measures.jpg</image:loc><image:caption>3pitfallsofemailsecuritymeasures</image:caption><image:title>3pitfallsofemailsecuritymeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image-hero-v3.webp</image:loc><image:caption>imageherov3</image:caption><image:title>imageherov3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/digital-workplace.png</image:loc><image:caption>digitalworkplace</image:caption><image:title>digitalworkplace</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/where-to-start-security-measures.png</image:loc><image:caption>wheretostartsecuritymeasures</image:caption><image:title>wheretostartsecuritymeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-introduction-guide.png</image:loc><image:caption>zerotrustintroductionguide</image:caption><image:title>zerotrustintroductionguide</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-is-multi-factor-authentication.png</image:loc><image:caption>whatismultifactorauthentication</image:caption><image:title>whatismultifactorauthentication</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/information-systems-departments-2022.png</image:loc><image:caption>informationsystemsdepartments2022</image:caption><image:title>informationsystemsdepartments2022</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-complete-guide-avoiding-cloud-misconfigurations.png</image:loc><image:caption>thecompleteguideavoidingcloudmisconfigurations</image:caption><image:title>thecompleteguideavoidingcloudmisconfigurations</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-is-the-most-important-security.png</image:loc><image:caption>whatisthemostimportantsecurity</image:caption><image:title>whatisthemostimportantsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/cloud-security-guide.png</image:loc><image:caption>cloudsecurityguide</image:caption><image:title>cloudsecurityguide</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-security-measures-required.png</image:loc><image:caption>whatsecuritymeasuresrequired</image:caption><image:title>whatsecuritymeasuresrequired</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-key-to-building-a-zero-trust-network.png</image:loc><image:caption>thekeytobuildingazerotrustnetwork</image:caption><image:title>thekeytobuildingazerotrustnetwork</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/information-systems-department.png</image:loc><image:caption>informationsystemsdepartment</image:caption><image:title>informationsystemsdepartment</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/threat-surrounding-cyberspace.png</image:loc><image:caption>threatsurroundingcyberspace</image:caption><image:title>threatsurroundingcyberspace</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-is-cybersecurity-management-need-now.png</image:loc><image:caption>whatiscybersecuritymanagementneednow</image:caption><image:title>whatiscybersecuritymanagementneednow</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-current-state-of-ppap-and-alternatives.png</image:loc><image:caption>thecurrentstateofppapandalternatives</image:caption><image:title>thecurrentstateofppapandalternatives</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/digitization-and-cloud-security.png</image:loc><image:caption>digitizationandcloudsecurity</image:caption><image:title>digitizationandcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/current-highlights-of-dmarc.png</image:loc><image:caption>currenthighlightsofdmarc</image:caption><image:title>currenthighlightsofdmarc</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/implemented-at-salesforce-com.png</image:loc><image:caption>implementedatsalesforcecom</image:caption><image:title>implementedatsalesforcecom</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/the-replacement-cloud.png</image:loc><image:caption>thereplacementcloud</image:caption><image:title>thereplacementcloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/seven-tactics-obtaining-security-budgets.png</image:loc><image:caption>seventacticsobtainingsecuritybudgets</image:caption><image:title>seventacticsobtainingsecuritybudgets</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/info-security-for-medical.png</image:loc><image:caption>infosecurityformedical</image:caption><image:title>infosecurityformedical</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/user-provisioning.png</image:loc><image:caption>userprovisioning</image:caption><image:title>userprovisioning</image:title></image:image><lastmod>2025-07-09</lastmod></url><url><loc>https://www.cloud-security.jp/news/rakurakumeisai-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/rakurakumeisai-x-henngeone.jpeg</image:loc><image:caption>rakurakumeisaixhenngeone</image:caption><image:title>rakurakumeisaixhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/news/minagine-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/minagine-x-henngeone.jpeg</image:loc><image:caption>minaginexhenngeone</image:caption><image:title>minaginexhenngeone</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-establish-sso</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-mail-security-soft</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-mail-security-soft.webp</image:loc><image:caption>whatismailsecuritysoft</image:caption><image:title>whatismailsecuritysoft</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/ppap-alternatives-and-countermeasures</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/ppap-alternatives-and-countermeasures.webp</image:loc><image:caption>ppapalternativesandcountermeasures</image:caption><image:title>ppapalternativesandcountermeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-emotet-email-examples-features</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-3.webp</image:loc><image:caption>whatemotetemailexamplesfeatures3</image:caption><image:title>whatemotetemailexamplesfeatures3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-1-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures11</image:caption><image:title>whatemotetemailexamplesfeatures11</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-4.webp</image:loc><image:caption>whatemotetemailexamplesfeatures4</image:caption><image:title>whatemotetemailexamplesfeatures4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-6-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures61</image:caption><image:title>whatemotetemailexamplesfeatures61</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-2-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures21</image:caption><image:title>whatemotetemailexamplesfeatures21</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures1</image:caption><image:title>whatemotetemailexamplesfeatures1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-8-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures81</image:caption><image:title>whatemotetemailexamplesfeatures81</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-7-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures71</image:caption><image:title>whatemotetemailexamplesfeatures71</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-9-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures91</image:caption><image:title>whatemotetemailexamplesfeatures91</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-emotet-email-examples-features-5-1.webp</image:loc><image:caption>whatemotetemailexamplesfeatures51</image:caption><image:title>whatemotetemailexamplesfeatures51</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/hennge-20230629</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-06-15</lastmod></url><url><loc>https://www.cloud-security.jp/blog/neccesary-basic-security-for-mail</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/neccesary-basic-security-for-mail-1-2.webp</image:loc><image:caption>neccesarybasicsecurityformail12</image:caption><image:title>neccesarybasicsecurityformail12</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/neccesary-basic-security-for-mail-2-2.webp</image:loc><image:caption>neccesarybasicsecurityformail22</image:caption><image:title>neccesarybasicsecurityformail22</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/neccesary-basic-security-for-mail-Jul-05-2024-08-20-47-8188-AM.webp</image:loc><image:caption>neccesarybasicsecurityformailJul0520240820478188AM</image:caption><image:title>neccesarybasicsecurityformailJul0520240820478188AM</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/neccesary-basic-security-for-mail-3-2.webp</image:loc><image:caption>neccesarybasicsecurityformail32</image:caption><image:title>neccesarybasicsecurityformail32</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/keep-email-attachments-secure</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/keep-email-attachments-secure.webp</image:loc><image:caption>keepemailattachmentssecure</image:caption><image:title>keepemailattachmentssecure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-difference-between-sase-and-casb</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/limit-with-vpn.webp</image:loc><image:caption>limitwithvpn</image:caption><image:title>limitwithvpn</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb-04.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb04</image:caption><image:title>whatdifferencebetweensaseandcasb04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb-05.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb05</image:caption><image:title>whatdifferencebetweensaseandcasb05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb-02.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb02</image:caption><image:title>whatdifferencebetweensaseandcasb02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb-06.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb06</image:caption><image:title>whatdifferencebetweensaseandcasb06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb-07.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb07</image:caption><image:title>whatdifferencebetweensaseandcasb07</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb-01.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb01</image:caption><image:title>whatdifferencebetweensaseandcasb01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb-03.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb03</image:caption><image:title>whatdifferencebetweensaseandcasb03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/image-hero-v3.jpg</image:loc><image:caption>imageherov3</image:caption><image:title>imageherov3</image:title></image:image><lastmod>2023-10-12</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-features-and-system-requirements</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-features-and-system-requirements.webp</image:loc><image:caption>thefeaturesandsystemrequirements</image:caption><image:title>thefeaturesandsystemrequirements</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/cloud-security-comparison</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cloud-security-comparison.webp</image:loc><image:caption>cloudsecuritycomparison</image:caption><image:title>cloudsecuritycomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-realize-sso-on-azure-ad.webp</image:loc><image:caption>howtorealizessoonazuread</image:caption><image:title>howtorealizessoonazuread</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/shutterstock_1654003363%20(1)-1.jpg</image:loc><image:caption>shutterstock165400336311</image:caption><image:title>shutterstock165400336311</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-zero-trust-and-microsoft-products</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust-and-microsoft-products.webp</image:loc><image:caption>whatiszerotrustandmicrosoftproducts</image:caption><image:title>whatiszerotrustandmicrosoftproducts</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/inochio-holdings-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/inochio-holdings-case.png</image:loc><image:caption>inochioholdingscase</image:caption><image:title>inochioholdingscase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-03-16</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-emotet</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-10.webp</image:loc><image:caption>whatisemotet10</image:caption><image:title>whatisemotet10</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-9.webp</image:loc><image:caption>whatisemotet9</image:caption><image:title>whatisemotet9</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-8.webp</image:loc><image:caption>whatisemotet8</image:caption><image:title>whatisemotet8</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-3.webp</image:loc><image:caption>whatisemotet3</image:caption><image:title>whatisemotet3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet.webp</image:loc><image:caption>whatisemotet</image:caption><image:title>whatisemotet</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-5.webp</image:loc><image:caption>whatisemotet5</image:caption><image:title>whatisemotet5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-4.webp</image:loc><image:caption>whatisemotet4</image:caption><image:title>whatisemotet4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-6.webp</image:loc><image:caption>whatisemotet6</image:caption><image:title>whatisemotet6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-7.webp</image:loc><image:caption>whatisemotet7</image:caption><image:title>whatisemotet7</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-1.webp</image:loc><image:caption>whatisemotet1</image:caption><image:title>whatisemotet1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-emotet-2.webp</image:loc><image:caption>whatisemotet2</image:caption><image:title>whatisemotet2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-kind-of-app-is-slack</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack-1.webp</image:loc><image:caption>whatkindofappisslack1</image:caption><image:title>whatkindofappisslack1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/compare-with-mail-security-soft</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/compare-with-mail-security-soft.webp</image:loc><image:caption>comparewithmailsecuritysoft</image:caption><image:title>comparewithmailsecuritysoft</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/bec-experience-workshop-20240229</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/miyauchi.png</image:loc><image:caption>miyauchi</image:caption><image:title>miyauchi</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/takeda.png</image:loc><image:caption>takeda</image:caption><image:title>takeda</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/bec-experience-workshop-20240229.png</image:loc><image:caption>becexperienceworkshop20240229</image:caption><image:title>becexperienceworkshop20240229</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/kamata.png</image:loc><image:caption>kamata</image:caption><image:title>kamata</image:title></image:image><lastmod>2024-01-31</lastmod></url><url><loc>https://www.cloud-security.jp/blog/9-domestic-ransomware-cases</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases-06.webp</image:loc><image:caption>9domesticransomwarecases06</image:caption><image:title>9domesticransomwarecases06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases-04.webp</image:loc><image:caption>9domesticransomwarecases04</image:caption><image:title>9domesticransomwarecases04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases-02.webp</image:loc><image:caption>9domesticransomwarecases02</image:caption><image:title>9domesticransomwarecases02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-s-mime.webp</image:loc><image:caption>whatissmime</image:caption><image:title>whatissmime</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases-03.webp</image:loc><image:caption>9domesticransomwarecases03</image:caption><image:title>9domesticransomwarecases03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases-01.webp</image:loc><image:caption>9domesticransomwarecases01</image:caption><image:title>9domesticransomwarecases01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases-05.webp</image:loc><image:caption>9domesticransomwarecases05</image:caption><image:title>9domesticransomwarecases05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><lastmod>2025-04-18</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/japan-dx-conference-20240628</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/corporate-security-measures</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/corporate-security-measures.webp</image:loc><image:caption>corporatesecuritymeasures</image:caption><image:title>corporatesecuritymeasures</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-risks-of-encrypting-email-attachment</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-risks-of-encrypting-email-attachment.webp</image:loc><image:caption>whatrisksofencryptingemailattachment</image:caption><image:title>whatrisksofencryptingemailattachment</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-risks-of-encrypting-email-attachment-06.webp</image:loc><image:caption>whatrisksofencryptingemailattachment06</image:caption><image:title>whatrisksofencryptingemailattachment06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-risks-of-encrypting-email-attachment-03.webp</image:loc><image:caption>whatrisksofencryptingemailattachment03</image:caption><image:title>whatrisksofencryptingemailattachment03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-risks-of-encrypting-email-attachment-01.webp</image:loc><image:caption>whatrisksofencryptingemailattachment01</image:caption><image:title>whatrisksofencryptingemailattachment01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-risks-of-encrypting-email-attachment-05.webp</image:loc><image:caption>whatrisksofencryptingemailattachment05</image:caption><image:title>whatrisksofencryptingemailattachment05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-risks-of-encrypting-email-attachment-02.webp</image:loc><image:caption>whatrisksofencryptingemailattachment02</image:caption><image:title>whatrisksofencryptingemailattachment02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-risks-of-encrypting-email-attachment-04.webp</image:loc><image:caption>whatrisksofencryptingemailattachment04</image:caption><image:title>whatrisksofencryptingemailattachment04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/zero-trust-environment-in-micro-segmentation</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/zero-trust-environment-in-micro-segmentation.webp</image:loc><image:caption>zerotrustenvironmentinmicrosegmentation</image:caption><image:title>zerotrustenvironmentinmicrosegmentation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/zero-trust-introduction-guide</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-introduction-guide-02.png</image:loc><image:caption>zerotrustintroductionguide02</image:caption><image:title>zerotrustintroductionguide02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-introduction-guide-01.png</image:loc><image:caption>zerotrustintroductionguide01</image:caption><image:title>zerotrustintroductionguide01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/zero-trust-introduction-guide.png</image:loc><image:caption>zerotrustintroductionguide</image:caption><image:title>zerotrustintroductionguide</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/news/file-dlp-tadrill-hennge-one</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2024-07-25</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-azure-sentine</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-azure-sentine.webp</image:loc><image:caption>whatisazuresentine</image:caption><image:title>whatisazuresentine</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-difference-between-siem-and-soar</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar-03.webp</image:loc><image:caption>thedifferencebetweensiemandsoar03</image:caption><image:title>thedifferencebetweensiemandsoar03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap.webp</image:loc><image:caption>whatisiap</image:caption><image:title>whatisiap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar-02.webp</image:loc><image:caption>thedifferencebetweensiemandsoar02</image:caption><image:title>thedifferencebetweensiemandsoar02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar-04.webp</image:loc><image:caption>thedifferencebetweensiemandsoar04</image:caption><image:title>thedifferencebetweensiemandsoar04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar-05.webp</image:loc><image:caption>thedifferencebetweensiemandsoar05</image:caption><image:title>thedifferencebetweensiemandsoar05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar-01.webp</image:loc><image:caption>thedifferencebetweensiemandsoar01</image:caption><image:title>thedifferencebetweensiemandsoar01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/microsoft365-security-enhancement</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft365-security-enhancement.webp</image:loc><image:caption>microsoft365securityenhancement</image:caption><image:title>microsoft365securityenhancement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/dx-20240205</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/dx-20240205.png</image:loc><image:caption>dx20240205</image:caption><image:title>dx20240205</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/information-risks-caused-by-people</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-11-06</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/security-management-summit-2023</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-11-01</lastmod></url><url><loc>https://www.cloud-security.jp/blog/azure-security-system-counterplan</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/azure-security-system-counterplan.webp</image:loc><image:caption>azuresecuritysystemcounterplan</image:caption><image:title>azuresecuritysystemcounterplan</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-zero-trust-introduction-guide</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-zero-trust-introduction-guide.webp</image:loc><image:caption>thezerotrustintroductionguide</image:caption><image:title>thezerotrustintroductionguide</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-network-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-network-security.webp</image:loc><image:caption>whatisnetworksecurity</image:caption><image:title>whatisnetworksecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-method-available-for-file-sharing</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-method-available-for-file-sharing-1.webp</image:loc><image:caption>whatmethodavailableforfilesharing1</image:caption><image:title>whatmethodavailableforfilesharing1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-method-available-for-file-sharing.webp</image:loc><image:caption>whatmethodavailableforfilesharing</image:caption><image:title>whatmethodavailableforfilesharing</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-websso</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-websso.webp</image:loc><image:caption>whatiswebsso</image:caption><image:title>whatiswebsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-specific-dangers-of-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-specific-dangers-of-ppap.webp</image:loc><image:caption>thespecificdangersofppap</image:caption><image:title>thespecificdangersofppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/dx-camp-20240206</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-01-31</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-measures-required-for-telework-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-measures-required-for-telework-security.webp</image:loc><image:caption>themeasuresrequiredforteleworksecurity</image:caption><image:title>themeasuresrequiredforteleworksecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/security-management-conference-2023-winter-20231214</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://www.cloud-security.jp/blog/important-thing-for-sending-email</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/important-thing-for-sending-email.webp</image:loc><image:caption>importantthingforsendingemail</image:caption><image:title>importantthingforsendingemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/use-outlook-safely</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/use-outlook-safely.webp</image:loc><image:caption>useoutlooksafely</image:caption><image:title>useoutlooksafely</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-for-outlook-mail</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/windows-10-mail-security-measurement.webp</image:loc><image:caption>windows10mailsecuritymeasurement</image:caption><image:title>windows10mailsecuritymeasurement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-for-outlook-mail.webp</image:loc><image:caption>securityforoutlookmail</image:caption><image:title>securityforoutlookmail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/jiw-20240426</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-tls</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-7.webp</image:loc><image:caption>whatistls7</image:caption><image:title>whatistls7</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-3-1.webp</image:loc><image:caption>whatistls31</image:caption><image:title>whatistls31</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-4-1.webp</image:loc><image:caption>whatistls41</image:caption><image:title>whatistls41</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-6.webp</image:loc><image:caption>whatistls6</image:caption><image:title>whatistls6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-9-1.webp</image:loc><image:caption>whatistls91</image:caption><image:title>whatistls91</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1-2.webp</image:loc><image:caption>whatistls12</image:caption><image:title>whatistls12</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-2-1.webp</image:loc><image:caption>whatistls21</image:caption><image:title>whatistls21</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-5.webp</image:loc><image:caption>whatistls5</image:caption><image:title>whatistls5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-8-1.webp</image:loc><image:caption>whatistls81</image:caption><image:title>whatistls81</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-zero-trust-authentication</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust-authentication.webp</image:loc><image:caption>whatiszerotrustauthentication</image:caption><image:title>whatiszerotrustauthentication</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-hennge-email-dlp</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-hennge-email-dlp.webp</image:loc><image:caption>whatishenngeemaildlp</image:caption><image:title>whatishenngeemaildlp</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/azure-active-directory-and-security-group</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/azure-active-directory-and-security-group.webp</image:loc><image:caption>azureactivedirectoryandsecuritygroup</image:caption><image:title>azureactivedirectoryandsecuritygroup</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-dkim</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-5.webp</image:loc><image:caption>whatisdkim5</image:caption><image:title>whatisdkim5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-2-1.webp</image:loc><image:caption>whatisdkim21</image:caption><image:title>whatisdkim21</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-6.webp</image:loc><image:caption>whatisdkim6</image:caption><image:title>whatisdkim6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-1.webp</image:loc><image:caption>whatisdkim1</image:caption><image:title>whatisdkim1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-3-1.webp</image:loc><image:caption>whatisdkim31</image:caption><image:title>whatisdkim31</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-7-1.webp</image:loc><image:caption>whatisdkim71</image:caption><image:title>whatisdkim71</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-4.webp</image:loc><image:caption>whatisdkim4</image:caption><image:title>whatisdkim4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-dkim-1-1.webp</image:loc><image:caption>whatisdkim11</image:caption><image:title>whatisdkim11</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/subscription</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/middle-v2.jpg</image:loc><image:caption>middlev2</image:caption><image:title>middlev2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/overlay-bg.jpg</image:loc><image:caption>overlaybg</image:caption><image:title>overlaybg</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.png</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/left-v2.jpg</image:loc><image:caption>leftv2</image:caption><image:title>leftv2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/right-v2.jpg</image:loc><image:caption>rightv2</image:caption><image:title>rightv2</image:title></image:image><lastmod>2022-02-08</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-email-filtering</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-email-filtering-1-2.webp</image:loc><image:caption>whatisemailfiltering12</image:caption><image:title>whatisemailfiltering12</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-email-filtering-2-2.webp</image:loc><image:caption>whatisemailfiltering22</image:caption><image:title>whatisemailfiltering22</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-email-filtering-4-2.webp</image:loc><image:caption>whatisemailfiltering42</image:caption><image:title>whatisemailfiltering42</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-email-filtering-6-2.webp</image:loc><image:caption>whatisemailfiltering62</image:caption><image:title>whatisemailfiltering62</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-email-filtering-3-2.webp</image:loc><image:caption>whatisemailfiltering32</image:caption><image:title>whatisemailfiltering32</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-email-filtering-5-2.webp</image:loc><image:caption>whatisemailfiltering52</image:caption><image:title>whatisemailfiltering52</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-email-filtering-Jul-05-2024-08-21-12-1021-AM.webp</image:loc><image:caption>whatisemailfilteringJul0520240821121021AM</image:caption><image:title>whatisemailfilteringJul0520240821121021AM</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-zero-trust-security-framework</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-zero-trust-security-framework.webp</image:loc><image:caption>thezerotrustsecurityframework</image:caption><image:title>thezerotrustsecurityframework</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/understand-all-functions-seminar</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/understand-all-functions-seminar-pc.png</image:loc><image:caption>understandallfunctionsseminarpc</image:caption><image:title>understandallfunctionsseminarpc</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-06-01</lastmod></url><url><loc>https://www.cloud-security.jp/top-10-information-security-threats</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/top-10-information-security-threats.webp</image:loc><image:caption>top10informationsecuritythreats</image:caption><image:title>top10informationsecuritythreats</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/top-10-information-security-threats-v2.webp</image:loc><image:caption>top10informationsecuritythreatsv2</image:caption><image:title>top10informationsecuritythreatsv2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/top-10-information-security-threats-v1.webp</image:loc><image:caption>top10informationsecuritythreatsv1</image:caption><image:title>top10informationsecuritythreatsv1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/top-10-information-security-threats.png</image:loc><image:caption>top10informationsecuritythreats</image:caption><image:title>top10informationsecuritythreats</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/top-10-information-security-threats-v4.webp</image:loc><image:caption>top10informationsecuritythreatsv4</image:caption><image:title>top10informationsecuritythreatsv4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/top-10-information-security-threats-v3.webp</image:loc><image:caption>top10informationsecuritythreatsv3</image:caption><image:title>top10informationsecuritythreatsv3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/solution-banner.webp</image:loc><image:caption>solutionbanner</image:caption><image:title>solutionbanner</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-06-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/what-is-multi-factor-authentication</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-is-multi-factor-authentication-02.png</image:loc><image:caption>whatismultifactorauthentication02</image:caption><image:title>whatismultifactorauthentication02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-is-multi-factor-authentication.png</image:loc><image:caption>whatismultifactorauthentication</image:caption><image:title>whatismultifactorauthentication</image:title></image:image><lastmod>2025-02-13</lastmod></url><url><loc>https://www.cloud-security.jp/blog/public-cloud-security-risk-responsibility</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/public-cloud-security-risk-responsibility.webp</image:loc><image:caption>publiccloudsecurityriskresponsibility</image:caption><image:title>publiccloudsecurityriskresponsibility</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/microsoft-sentinel</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel-6.webp</image:loc><image:caption>microsoftsentinel6</image:caption><image:title>microsoftsentinel6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel-5.webp</image:loc><image:caption>microsoftsentinel5</image:caption><image:title>microsoftsentinel5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel-3.webp</image:loc><image:caption>microsoftsentinel3</image:caption><image:title>microsoftsentinel3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel-2.webp</image:loc><image:caption>microsoftsentinel2</image:caption><image:title>microsoftsentinel2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel-4.webp</image:loc><image:caption>microsoftsentinel4</image:caption><image:title>microsoftsentinel4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel-1.webp</image:loc><image:caption>microsoftsentinel1</image:caption><image:title>microsoftsentinel1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel-7.webp</image:loc><image:caption>microsoftsentinel7</image:caption><image:title>microsoftsentinel7</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/20210615-tokyo-telework-awards</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2021-05-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-choice-sso</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-choice-sso.webp</image:loc><image:caption>howtochoicesso</image:caption><image:title>howtochoicesso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/cybozu-cloud-garden-osaka-20240611</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust-3.webp</image:loc><image:caption>whatiszerotrust3</image:caption><image:title>whatiszerotrust3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/aws-risk-and-security.webp</image:loc><image:caption>awsriskandsecurity</image:caption><image:title>awsriskandsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust-2.webp</image:loc><image:caption>whatiszerotrust2</image:caption><image:title>whatiszerotrust2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/limit-with-vpn.webp</image:loc><image:caption>limitwithvpn</image:caption><image:title>limitwithvpn</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust-1.webp</image:loc><image:caption>whatiszerotrust1</image:caption><image:title>whatiszerotrust1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-basics-of-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-basics-of-zero-trust.webp</image:loc><image:caption>thebasicsofzerotrust</image:caption><image:title>thebasicsofzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-sso</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-sso.webp</image:loc><image:caption>whatissso</image:caption><image:title>whatissso</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/id-manage-seminar-20240312</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/id-manage-seminar-20240312.png</image:loc><image:caption>idmanageseminar20240312</image:caption><image:title>idmanageseminar20240312</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-okta</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/inquiry</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/overlay-bg.jpg</image:loc><image:caption>overlaybg</image:caption><image:title>overlaybg</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-02-14</lastmod></url><url><loc>https://www.cloud-security.jp/blog/webmail-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/webmail-security.webp</image:loc><image:caption>webmailsecurity</image:caption><image:title>webmailsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/garoon-x-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/garoon-x-hennge-1.jpeg</image:loc><image:caption>garoonxhennge1</image:caption><image:title>garoonxhennge1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/garoon-x-hennge.jpeg</image:loc><image:caption>garoonxhennge</image:caption><image:title>garoonxhennge</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/ransomware-countermeasure</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/ransomware-countermeasure-1.webp</image:loc><image:caption>ransomwarecountermeasure1</image:caption><image:title>ransomwarecountermeasure1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/ransomware-countermeasure.webp</image:loc><image:caption>ransomwarecountermeasure</image:caption><image:title>ransomwarecountermeasure</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-collaboration-webinar-20200806</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2020-07-17</lastmod></url><url><loc>https://www.cloud-security.jp/news/customers-mail-cloud</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/customers-mail-cloud-02.png</image:loc><image:caption>customersmailcloud02</image:caption><image:title>customersmailcloud02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/customers-mail-cloud-01.png</image:loc><image:caption>customersmailcloud01</image:caption><image:title>customersmailcloud01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2024-07-02</lastmod></url><url><loc>https://www.cloud-security.jp/blog/make-id-management</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/make-id-management-1.webp</image:loc><image:caption>makeidmanagement1</image:caption><image:title>makeidmanagement1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/make-id-management.webp</image:loc><image:caption>makeidmanagement</image:caption><image:title>makeidmanagement</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/maruit-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/maruit-case.png</image:loc><image:caption>maruitcase</image:caption><image:title>maruitcase</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-the-zero-trust-model</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/limit-with-vpn.webp</image:loc><image:caption>limitwithvpn</image:caption><image:title>limitwithvpn</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/security-measures-realized-with-dynabook-hennge</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-11-08</lastmod></url><url><loc>https://www.cloud-security.jp/blog/dx-in-construction-industry</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/dx-in-construction-industry.webp</image:loc><image:caption>dxinconstructionindustry</image:caption><image:title>dxinconstructionindustry</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/dx-in-construction-industry-1.webp</image:loc><image:caption>dxinconstructionindustry1</image:caption><image:title>dxinconstructionindustry1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/dx-in-manufacturing-industry</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/dx-in-manufacturing-industry.webp</image:loc><image:caption>dxinmanufacturingindustry</image:caption><image:title>dxinmanufacturingindustry</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/dx-in-manufacturing-industry-1.webp</image:loc><image:caption>dxinmanufacturingindustry1</image:caption><image:title>dxinmanufacturingindustry1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-authentication-base</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-conduct-sso-on-office365.webp</image:loc><image:caption>howtoconductssoonoffice365</image:caption><image:title>howtoconductssoonoffice365</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-authentication-base.webp</image:loc><image:caption>whatisauthenticationbase</image:caption><image:title>whatisauthenticationbase</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-security-measures-for-google-workspace.webp</image:loc><image:caption>thesecuritymeasuresforgoogleworkspace</image:caption><image:title>thesecuritymeasuresforgoogleworkspace</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/20230926_sbbit</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-21</lastmod></url><url><loc>https://www.cloud-security.jp/news/hennge-20230622</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-06-15</lastmod></url><url><loc>https://www.cloud-security.jp/blog/remote-work-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/remote-work-security.webp</image:loc><image:caption>remoteworksecurity</image:caption><image:title>remoteworksecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/cloud-storage-that-realizes-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cloud-storage-that-realizes-ppap.webp</image:loc><image:caption>cloudstoragethatrealizesppap</image:caption><image:title>cloudstoragethatrealizesppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/15tools-for-remort-work</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/15tools-for-remort-work.webp</image:loc><image:caption>15toolsforremortwork</image:caption><image:title>15toolsforremortwork</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/moconavi-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/recomot-lgwan.jpeg</image:loc><image:caption>recomotlgwan</image:caption><image:title>recomotlgwan</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/moconavi-x-henngeone.jpeg</image:loc><image:caption>moconavixhenngeone</image:caption><image:title>moconavixhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-12-04</lastmod></url><url><loc>https://www.cloud-security.jp/blog/essential-to-support-zero-trust</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/essential-to-support-zero-trust.webp</image:loc><image:caption>essentialtosupportzerotrust</image:caption><image:title>essentialtosupportzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-cloud-security-casb</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb-4.webp</image:loc><image:caption>whatiscloudsecuritycasb4</image:caption><image:title>whatiscloudsecuritycasb4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb-3.webp</image:loc><image:caption>whatiscloudsecuritycasb3</image:caption><image:title>whatiscloudsecuritycasb3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb-1.webp</image:loc><image:caption>whatiscloudsecuritycasb1</image:caption><image:title>whatiscloudsecuritycasb1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb-2.webp</image:loc><image:caption>whatiscloudsecuritycasb2</image:caption><image:title>whatiscloudsecuritycasb2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/ricoh-japan-wednesday-webinar-20240522</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/news/courageux-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/courageux-x-henngeone.jpeg</image:loc><image:caption>courageuxxhenngeone</image:caption><image:title>courageuxxhenngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/news/henngeone-education</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/henngeone-education.jpeg</image:loc><image:caption>henngeoneeducation</image:caption><image:title>henngeoneeducation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2023-09-29</lastmod></url><url><loc>https://www.cloud-security.jp/blog/the-zero-trust-beyondcorp</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/the-zero-trust-beyondcorp.webp</image:loc><image:caption>thezerotrustbeyondcorp</image:caption><image:title>thezerotrustbeyondcorp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-zerotrust-network</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zerotrust-network.webp</image:loc><image:caption>whatiszerotrustnetwork</image:caption><image:title>whatiszerotrustnetwork</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/news/akamai-x-henngeone</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/news/akamai-x-henngeone.png</image:loc><image:caption>akamaixhenngeone</image:caption><image:title>akamaixhenngeone</image:title></image:image><lastmod>2024-05-29</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/information-security-management-seminar-20231107</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2023-10-17</lastmod></url><url><loc>https://www.cloud-security.jp/blog/accelerating-dx-using-saas</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/accelerating-dx-using-saas-6.webp</image:loc><image:caption>acceleratingdxusingsaas6</image:caption><image:title>acceleratingdxusingsaas6</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/accelerating-dx-using-saas-1.webp</image:loc><image:caption>acceleratingdxusingsaas1</image:caption><image:title>acceleratingdxusingsaas1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/accelerating-dx-using-saas-2.webp</image:loc><image:caption>acceleratingdxusingsaas2</image:caption><image:title>acceleratingdxusingsaas2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/accelerating-dx-using-saas-3.webp</image:loc><image:caption>acceleratingdxusingsaas3</image:caption><image:title>acceleratingdxusingsaas3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/accelerating-dx-using-saas-5.webp</image:loc><image:caption>acceleratingdxusingsaas5</image:caption><image:title>acceleratingdxusingsaas5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/accelerating-dx-using-saas.webp</image:loc><image:caption>acceleratingdxusingsaas</image:caption><image:title>acceleratingdxusingsaas</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/accelerating-dx-using-saas-4.webp</image:loc><image:caption>acceleratingdxusingsaas4</image:caption><image:title>acceleratingdxusingsaas4</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-isms-cloud-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-isms-cloud-security.webp</image:loc><image:caption>whatisismscloudsecurity</image:caption><image:title>whatisismscloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/hennge-meet-up-202303</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2022-12-21</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-provisioning</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-provisioning-1.webp</image:loc><image:caption>whatisprovisioning1</image:caption><image:title>whatisprovisioning1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-provisioning.webp</image:loc><image:caption>whatisprovisioning</image:caption><image:title>whatisprovisioning</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/cyber-attack-experience-online-workshop-part2-20220621</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cloud-security.jp/blog/measures-of-cloud-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/measures-of-cloud-security.webp</image:loc><image:caption>measuresofcloudsecurity</image:caption><image:title>measuresofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/security-measures</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-measures-1.webp</image:loc><image:caption>securitymeasures1</image:caption><image:title>securitymeasures1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/security-measures.webp</image:loc><image:caption>securitymeasures</image:caption><image:title>securitymeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-edr</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-edr.webp</image:loc><image:caption>whatisedr</image:caption><image:title>whatisedr</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/cloud-computing-industry-20210825</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://www.cloud-security.jp/blog/7-visualization-tools</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools.webp</image:loc><image:caption>7visualizationtools</image:caption><image:title>7visualizationtools</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails.webp</image:loc><image:caption>targetedattackemails</image:caption><image:title>targetedattackemails</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-01.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware01</image:caption><image:title>howtocheckcomputerinfectedmalware01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools-05.webp</image:loc><image:caption>7visualizationtools05</image:caption><image:title>7visualizationtools05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools-01.webp</image:loc><image:caption>7visualizationtools01</image:caption><image:title>7visualizationtools01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools-04.webp</image:loc><image:caption>7visualizationtools04</image:caption><image:title>7visualizationtools04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks.webp</image:loc><image:caption>whattrainingtargetedemailattacks</image:caption><image:title>whattrainingtargetedemailattacks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools-02.webp</image:loc><image:caption>7visualizationtools02</image:caption><image:title>7visualizationtools02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools-03.webp</image:loc><image:caption>7visualizationtools03</image:caption><image:title>7visualizationtools03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks.webp</image:loc><image:caption>5corporatecasesinformationleaks</image:caption><image:title>5corporatecasesinformationleaks</image:title></image:image><lastmod>2025-04-18</lastmod></url><url><loc>https://www.cloud-security.jp/blog/dangers-of-ppap</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/dangers-of-ppap.webp</image:loc><image:caption>dangersofppap</image:caption><image:title>dangersofppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/zero-trust-important-in-telework</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/zero-trust-important-in-telework.webp</image:loc><image:caption>zerotrustimportantintelework</image:caption><image:title>zerotrustimportantintelework</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-realize-sso-on-azure-ad</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-realize-sso-on-azure-ad.webp</image:loc><image:caption>howtorealizessoonazuread</image:caption><image:title>howtorealizessoonazuread</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-fortigate</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/difference-safe-and-zero-trust.webp</image:loc><image:caption>differencesafeandzerotrust</image:caption><image:title>differencesafeandzerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-cloud-security-casb.webp</image:loc><image:caption>whatiscloudsecuritycasb</image:caption><image:title>whatiscloudsecuritycasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zscaler_about.webp</image:loc><image:caption>zscalerabout</image:caption><image:title>zscalerabout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate.webp</image:loc><image:caption>whatisfortigate</image:caption><image:title>whatisfortigate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate-1.webp</image:loc><image:caption>whatisfortigate1</image:caption><image:title>whatisfortigate1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-zero-trust.webp</image:loc><image:caption>whatiszerotrust</image:caption><image:title>whatiszerotrust</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate-2.webp</image:loc><image:caption>whatisfortigate2</image:caption><image:title>whatisfortigate2</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-the-zero-trust-model.webp</image:loc><image:caption>whatisthezerotrustmodel</image:caption><image:title>whatisthezerotrustmodel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/microsoft-sentinel.webp</image:loc><image:caption>microsoftsentinel</image:caption><image:title>microsoftsentinel</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-splunk.webp</image:loc><image:caption>whatissplunk</image:caption><image:title>whatissplunk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate-3.webp</image:loc><image:caption>whatisfortigate3</image:caption><image:title>whatisfortigate3</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate-5.webp</image:loc><image:caption>whatisfortigate5</image:caption><image:title>whatisfortigate5</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-difference-between-sase-and-casb.webp</image:loc><image:caption>whatdifferencebetweensaseandcasb</image:caption><image:title>whatdifferencebetweensaseandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-fortigate-4.webp</image:loc><image:caption>whatisfortigate4</image:caption><image:title>whatisfortigate4</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-security-measure</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/japan-dx-conference-20240719</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/resource/future-idaas-selection-points</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/future-idaas-selection-points-02.png</image:loc><image:caption>futureidaasselectionpoints02</image:caption><image:title>futureidaasselectionpoints02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/future-idaas-selection-points-01.png</image:loc><image:caption>futureidaasselectionpoints01</image:caption><image:title>futureidaasselectionpoints01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/future-idaas-selection-points.png</image:loc><image:caption>futureidaasselectionpoints</image:caption><image:title>futureidaasselectionpoints</image:title></image:image><lastmod>2024-09-16</lastmod></url><url><loc>https://www.cloud-security.jp/blog/explanation-of-the-difference-between-swg-and-casb</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb-06.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb06</image:caption><image:title>explanationofthedifferencebetweenswgandcasb06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-iap.webp</image:loc><image:caption>whatisiap</image:caption><image:title>whatisiap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb-01.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb01</image:caption><image:title>explanationofthedifferencebetweenswgandcasb01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb-03.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb03</image:caption><image:title>explanationofthedifferencebetweenswgandcasb03</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb-02.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb02</image:caption><image:title>explanationofthedifferencebetweenswgandcasb02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb-05.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb05</image:caption><image:title>explanationofthedifferencebetweenswgandcasb05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb-04.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb04</image:caption><image:title>explanationofthedifferencebetweenswgandcasb04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/azure-security-best-practice</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/azure-security-best-practice.webp</image:loc><image:caption>azuresecuritybestpractice</image:caption><image:title>azuresecuritybestpractice</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/net-protections-case</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/net-protections-case.png</image:loc><image:caption>netprotectionscase</image:caption><image:title>netprotectionscase</image:title></image:image><lastmod>2025-02-10</lastmod></url><url><loc>https://www.cloud-security.jp/blog/what-is-idp</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp-4-1.webp</image:loc><image:caption>whatisidp41</image:caption><image:title>whatisidp41</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/the-difference-between-siem-and-soar.webp</image:loc><image:caption>thedifferencebetweensiemandsoar</image:caption><image:title>thedifferencebetweensiemandsoar</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp-1-2.webp</image:loc><image:caption>whatisidp12</image:caption><image:title>whatisidp12</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp-2-1.webp</image:loc><image:caption>whatisidp21</image:caption><image:title>whatisidp21</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-device-certificate.webp</image:loc><image:caption>whatisdevicecertificate</image:caption><image:title>whatisdevicecertificate</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp-01.webp</image:loc><image:caption>whatisidp01</image:caption><image:title>whatisidp01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp.webp</image:loc><image:caption>whatisidp</image:caption><image:title>whatisidp</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-sso-integration.webp</image:loc><image:caption>whatssointegration</image:caption><image:title>whatssointegration</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-idp-3-1.webp</image:loc><image:caption>whatisidp31</image:caption><image:title>whatisidp31</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-saml.webp</image:loc><image:caption>whatissaml</image:caption><image:title>whatissaml</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explanation-of-the-difference-between-swg-and-casb.webp</image:loc><image:caption>explanationofthedifferencebetweenswgandcasb</image:caption><image:title>explanationofthedifferencebetweenswgandcasb</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-kind-of-app-is-slack.webp</image:loc><image:caption>whatkindofappisslack</image:caption><image:title>whatkindofappisslack</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-okta.webp</image:loc><image:caption>whatisokta</image:caption><image:title>whatisokta</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-to-establish-sso.webp</image:loc><image:caption>howtoestablishsso</image:caption><image:title>howtoestablishsso</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/blog/remove-ppap-with-google-drive</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/remove-ppap-with-google-drive.webp</image:loc><image:caption>removeppapwithgoogledrive</image:caption><image:title>removeppapwithgoogledrive</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/aws-risk-and-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/aws-risk-and-security.webp</image:loc><image:caption>awsriskandsecurity</image:caption><image:title>awsriskandsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/googledrive-security-corporation.webp</image:loc><image:caption>googledrivesecuritycorporation</image:caption><image:title>googledrivesecuritycorporation</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-tls-1.webp</image:loc><image:caption>whatistls1</image:caption><image:title>whatistls1</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/basic-knowledge-of-cloud-security.webp</image:loc><image:caption>basicknowledgeofcloudsecurity</image:caption><image:title>basicknowledgeofcloudsecurity</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/onedrive-security-risk.webp</image:loc><image:caption>onedrivesecurityrisk</image:caption><image:title>onedrivesecurityrisk</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-a-security-cloud.webp</image:loc><image:caption>whatisasecuritycloud</image:caption><image:title>whatisasecuritycloud</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/cloud-security-comparison.webp</image:loc><image:caption>cloudsecuritycomparison</image:caption><image:title>cloudsecuritycomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-security-measure.webp</image:loc><image:caption>whatissecuritymeasure</image:caption><image:title>whatissecuritymeasure</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-local-breakout.webp</image:loc><image:caption>whatislocalbreakout</image:caption><image:title>whatislocalbreakout</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/box-onedrive-comparison.webp</image:loc><image:caption>boxonedrivecomparison</image:caption><image:title>boxonedrivecomparison</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/zero-trust-encyclopedia.jpg</image:loc><image:caption>zerotrustencyclopedia</image:caption><image:title>zerotrustencyclopedia</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/box-secure-cloud-storage-01.webp</image:loc><image:caption>boxsecurecloudstorage01</image:caption><image:title>boxsecurecloudstorage01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/resource/cyber-attacks-microsoft-365-email</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/cyber-attacks-microsoft-365-email-02.png</image:loc><image:caption>cyberattacksmicrosoft365email02</image:caption><image:title>cyberattacksmicrosoft365email02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/cyber-attacks-microsoft-365-email.png</image:loc><image:caption>cyberattacksmicrosoft365email</image:caption><image:title>cyberattacksmicrosoft365email</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/cyber-attacks-microsoft-365-email-01.png</image:loc><image:caption>cyberattacksmicrosoft365email01</image:caption><image:title>cyberattacksmicrosoft365email01</image:title></image:image><lastmod>2024-08-02</lastmod></url><url><loc>https://www.cloud-security.jp/blog/guidelines-refer-to-countermeasures-against-misdelivery</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/business-e-mail-compromise.webp</image:loc><image:caption>businessemailcompromise</image:caption><image:title>businessemailcompromise</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/how-prevent-emails-sent-wrong-person-outlook.webp</image:loc><image:caption>howpreventemailssentwrongpersonoutlook</image:caption><image:title>howpreventemailssentwrongpersonoutlook</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/ransomware-transmitted-by-email.webp</image:loc><image:caption>ransomwaretransmittedbyemail</image:caption><image:title>ransomwaretransmittedbyemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-is-ppap.webp</image:loc><image:caption>whatisppap</image:caption><image:title>whatisppap</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/guidelines-refer-to-countermeasures-against-misdelivery.webp</image:loc><image:caption>guidelinesrefertocountermeasuresagainstmisdelivery</image:caption><image:title>guidelinesrefertocountermeasuresagainstmisdelivery</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/what-is-fraud-triangle.webp</image:loc><image:caption>whatisfraudtriangle</image:caption><image:title>whatisfraudtriangle</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/9-domestic-ransomware-cases.webp</image:loc><image:caption>9domesticransomwarecases</image:caption><image:title>9domesticransomwarecases</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/explaining-importance-virus-checking-zip-files.webp</image:loc><image:caption>explainingimportanceviruscheckingzipfiles</image:caption><image:title>explainingimportanceviruscheckingzipfiles</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/blog/how-to-check-computer-infected-malware</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/7-visualization-tools.webp</image:loc><image:caption>7visualizationtools</image:caption><image:title>7visualizationtools</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-07.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware07</image:caption><image:title>howtocheckcomputerinfectedmalware07</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-06.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware06</image:caption><image:title>howtocheckcomputerinfectedmalware06</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/targeted-attack-emails.webp</image:loc><image:caption>targetedattackemails</image:caption><image:title>targetedattackemails</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog-new-images/what-training-targeted-email-attacks.webp</image:loc><image:caption>whattrainingtargetedemailattacks</image:caption><image:title>whattrainingtargetedemailattacks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-04.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware04</image:caption><image:title>howtocheckcomputerinfectedmalware04</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-02.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware02</image:caption><image:title>howtocheckcomputerinfectedmalware02</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-09.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware09</image:caption><image:title>howtocheckcomputerinfectedmalware09</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-01.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware01</image:caption><image:title>howtocheckcomputerinfectedmalware01</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/5-corporate-cases-information-leaks.webp</image:loc><image:caption>5corporatecasesinformationleaks</image:caption><image:title>5corporatecasesinformationleaks</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-05.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware05</image:caption><image:title>howtocheckcomputerinfectedmalware05</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-08.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware08</image:caption><image:title>howtocheckcomputerinfectedmalware08</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/blog/how-to-check-computer-infected-malware-03.webp</image:loc><image:caption>howtocheckcomputerinfectedmalware03</image:caption><image:title>howtocheckcomputerinfectedmalware03</image:title></image:image><lastmod>2025-03-26</lastmod></url><url><loc>https://www.cloud-security.jp/seminar/boxworks-tokyo-2024</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cloud-security.jp/solution/cyber-security</loc><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/hennge-one.webp</image:loc><image:caption>henngeone</image:caption><image:title>henngeone</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/hennge_logo_white_horizontal.png</image:loc><image:caption>henngelogowhitehorizontal</image:caption><image:title>henngelogowhitehorizontal</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/solution-banner.jpg</image:loc><image:caption>solutionbanner</image:caption><image:title>solutionbanner</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/resource/thumb/what-is-cybersecurity-management-need-now.png</image:loc><image:caption>whatiscybersecuritymanagementneednow</image:caption><image:title>whatiscybersecuritymanagementneednow</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/logo/logo-white.webp</image:loc><image:caption>logowhite</image:caption><image:title>logowhite</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/targeted-attack-email.png</image:loc><image:caption>targetedattackemail</image:caption><image:title>targetedattackemail</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/incident.png</image:loc><image:caption>incident</image:caption><image:title>incident</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-warining.png</image:loc><image:caption>iconwarining</image:caption><image:title>iconwarining</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/library/classic/images/popup-exit.png</image:loc><image:caption>popupexit</image:caption><image:title>popupexit</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/cyber.jpg</image:loc><image:caption>cyber</image:caption><image:title>cyber</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/targeted-attack-emails.jpg</image:loc><image:caption>targetedattackemails</image:caption><image:title>targetedattackemails</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/account.png</image:loc><image:caption>account</image:caption><image:title>account</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/icon/icon-security-check.png</image:loc><image:caption>iconsecuritycheck</image:caption><image:title>iconsecuritycheck</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/targeted-attack-countermeasures.png</image:loc><image:caption>targetedattackcountermeasures</image:caption><image:title>targetedattackcountermeasures</image:title></image:image><image:image><image:loc>https://www.cloud-security.jp/hubfs/images/dangerous-file-detection.png</image:loc><image:caption>dangerousfiledetection</image:caption><image:title>dangerousfiledetection</image:title></image:image><lastmod>2024-07-24</lastmod></url></urlset>