<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.monad.com</loc>
    </url>
    <url>
        <loc>https://www.monad.com/faq</loc>
    </url>
    <url>
        <loc>https://www.monad.com/integrations</loc>
    </url>
    <url>
        <loc>https://www.monad.com/privacy</loc>
    </url>
    <url>
        <loc>https://www.monad.com/product</loc>
    </url>
    <url>
        <loc>https://www.monad.com/terms</loc>
    </url>
    <url>
        <loc>https://www.monad.com/sign-up</loc>
    </url>
    <url>
        <loc>https://www.monad.com/use-cases</loc>
    </url>
    <url>
        <loc>https://www.monad.com/about</loc>
    </url>
    <url>
        <loc>https://www.monad.com/resources</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog</loc>
    </url>
    <url>
        <loc>https://www.monad.com/data-engineering</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes</loc>
    </url>
    <url>
        <loc>https://www.monad.com/media</loc>
    </url>
    <url>
        <loc>https://www.monad.com/careers</loc>
    </url>
    <url>
        <loc>https://www.monad.com/schedule-demo</loc>
    </url>
    <url>
        <loc>https://www.monad.com/join-our-list</loc>
    </url>
    <url>
        <loc>https://www.monad.com/rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog-redesign</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/2025-state-of-detection-engineering-report</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/300-integrations-more-coverage-less-noise-better-detections</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/a-detection-engineers-guide-to-cutting-siem-costs</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/advancing-data-driven-security-monad-adds-crowdstrike-edr-elasticsearch-and-github-advisory</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/advancing-security-data-management-with-aws-security-lake</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/announcing-monads-ocsf-templates</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/application-security-turbocharged-semgrep-monad-snowflake</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/data-engineering-cybersecurity-pt-1</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/data-engineering-for-cybersecurity-part-2</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/data-engineering-for-cybersecurity-part-3</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/data-engineering-for-cybersecurity-part-4</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/data-engineering-for-cybersecurity-part-5-enrichment</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/data-modeling-on-databricks</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/detection-engineering-for-claude-code-part-1</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/detection-engineering-for-claude-code-part-2</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/enrich-before-siem-ingestion-not-after</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/how-to-navigate-the-maze-of-security-api-data-limits</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/introducing-storage-cost-analysis</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/monad-integrates-with-snyk</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/monad-partnered-with-databricks</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/monad-welcomes-tarsal</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/monad-wins-wizs-inaugural-partner-award</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/openai-enterprise-audit-log-detections</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/pipeline-enrichments</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes---february-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes---january-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes---june-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes---march-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes---may-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes-august-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes-january-2026</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes-november-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes-october-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/product-release-notes-september-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/ransomware-visibility-at-your-fingertips-monad-adopts-cisas-kev-ransomware-column</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/robinhood</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/the-data-engineering-gap-in-security</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/unify-your-security-data</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/upstart</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/whats-new-in-monad-february-2026</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/why-teams-are-decoupling-their-siem-from-their-data-pipeline</loc>
    </url>
    <url>
        <loc>https://www.monad.com/blog/why-we-launched-monad</loc>
    </url>
    <url>
        <loc>https://www.monad.com/use-cases/cost-reduction</loc>
    </url>
    <url>
        <loc>https://www.monad.com/use-cases/ocsf-conversion</loc>
    </url>
    <url>
        <loc>https://www.monad.com/use-cases/security-operations</loc>
    </url>
    <url>
        <loc>https://www.monad.com/use-cases/security-vendors</loc>
    </url>
    <url>
        <loc>https://www.monad.com/use-cases/vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.monad.com/data-engineering/data-engineering-cybersecurity-pt-1</loc>
    </url>
    <url>
        <loc>https://www.monad.com/data-engineering/data-engineering-for-cybersecurity-part-2</loc>
    </url>
    <url>
        <loc>https://www.monad.com/data-engineering/data-engineering-for-cybersecurity-part-3</loc>
    </url>
    <url>
        <loc>https://www.monad.com/data-engineering/data-engineering-for-cybersecurity-part-4</loc>
    </url>
    <url>
        <loc>https://www.monad.com/data-engineering/data-engineering-for-cybersecurity-part-5-enrichment</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/april-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/august-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/december-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/february-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/january-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/july-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/june-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/march-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/march-2025</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/monad-community-bytes---february-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/monad-community-bytes---may-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/november-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/monad-community-bytes/october-2024</loc>
    </url>
    <url>
        <loc>https://www.monad.com/podcast/a-look-at-microsofts-cloud-native-siem---darwin-salazar---esw-259</loc>
    </url>
    <url>
        <loc>https://www.monad.com/podcast/detection-dispatch-ep-32-smoky-signals-security-etl-data-optimization-with-a-tasting-twist</loc>
    </url>
    <url>
        <loc>https://www.monad.com/podcast/front-lines-podcast-christian-almenar-ceo-of-monad-19-million-raised-to-solve-the-cybersecurity-big-data-problem</loc>
    </url>
    <url>
        <loc>https://www.monad.com/podcast/kql-kung-fu-finding-the-needle-in-the-haystack-in-azure-environments-w-darwin-salazar</loc>
    </url>
    <url>
        <loc>https://www.monad.com/podcast/leveraging-azure-resource-graph-for-good-and-for-evil---darwin-salazar</loc>
    </url>
    <url>
        <loc>https://www.monad.com/podcast/resilient-cyber-w-darwin-salazar---security-data-detections-the-cyber-market</loc>
    </url>
</urlset>