<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.trotta.io/</loc></url>
<url><loc>https://www.trotta.io/pricing</loc></url>
<url><loc>https://www.trotta.io/changelog</loc></url>
<url><loc>https://www.trotta.io/customers</loc></url>
<url><loc>https://www.trotta.io/contact</loc></url>
<url><loc>https://www.trotta.io/404</loc></url>
<url><loc>https://www.trotta.io/book</loc></url>
<url><loc>https://www.trotta.io/blog</loc></url>
<url><loc>https://www.trotta.io/changelog/malicious-ai-agents</loc></url>
<url><loc>https://www.trotta.io/changelog/whats-new</loc></url>
<url><loc>https://www.trotta.io/changelog/styling-elements</loc></url>
<url><loc>https://www.trotta.io/changelog/cost-of-deepfake-fraud-2026</loc></url>
<url><loc>https://www.trotta.io/changelog/zero-trust-identity-for-ai-phishing-defense</loc></url>
<url><loc>https://www.trotta.io/changelog/voice-cloning-attack-prevention-software-guide</loc></url>
<url><loc>https://www.trotta.io/changelog/abnormal-security-alternative-pre-delivery-playbook</loc></url>
<url><loc>https://www.trotta.io/changelog/proofpoint-vs-abnormal-security-showdown</loc></url>
<url><loc>https://www.trotta.io/changelog/behavioral-ai-email-security-masterplan</loc></url>
<url><loc>https://www.trotta.io/changelog/best-email-security-2026-autonomous-defense</loc></url>
<url><loc>https://www.trotta.io/changelog/phishing-detection-api-playbook</loc></url>
<url><loc>https://www.trotta.io/changelog/business-email-compromise-prevention-solution-playbook</loc></url>
<url><loc>https://www.trotta.io/changelog/ai-phishing-protection-software-blueprint</loc></url>
<url><loc>https://www.trotta.io/changelog/trotta-vs-barracuda-the-best-barracuda-alternative-for-2026</loc></url>
<url><loc>https://www.trotta.io/changelog/trotta-vs-hoxhunt-the-best-hoxhunt-alternative-for-2026</loc></url>
<url><loc>https://www.trotta.io/changelog/barracuda-email-security-alternative-field-manual</loc></url>
<url><loc>https://www.trotta.io/changelog/trotta-vs-cofense-pre-delivery-defense-vs-post-delivery-training</loc></url>
<url><loc>https://www.trotta.io/changelog/deepfake-voice-scam-prevention-playbook</loc></url>
<url><loc>https://www.trotta.io/changelog/trotta-vs-adaptive-security-the-best-adaptive-security-alternative-for-2026</loc></url>
<url><loc>https://www.trotta.io/changelog/proofpoint-vs-mimecast-2026-reality-check</loc></url>
<url><loc>https://www.trotta.io/changelog/autonomous-email-security-platform-blueprint</loc></url>
<url><loc>https://www.trotta.io/changelog/trotta-vs-knowbe4-why-pre-delivery-defense-wins-in-2026</loc></url>
<url><loc>https://www.trotta.io/changelog/knowbe4-alternative-autonomous-defense-guide</loc></url>
<url><loc>https://www.trotta.io/changelog/the-autonomous-mimecast-alternative-cisos-need</loc></url>
<url><loc>https://www.trotta.io/changelog/how-to-stop-ai-phishing-attacks-now</loc></url>
<url><loc>https://www.trotta.io/changelog/proofpoint-alternative-autonomous-defense-wins</loc></url>
</urlset>