<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://sajetree.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-09</lastmod>
  </url>
  <url>
    <loc>https://sajetree.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2020-08-12</lastmod>
  </url>
  <url>
    <loc>https://sajetree.com/howwework</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5f25f5be487e654ee4cd871e/t/5f308c52a13a6d7ea80d84e4/1597017185159/mike-kenneally-o14nNEbLa-s-unsplash_med.jpg</image:loc>
      <image:title>How We Work - Identify the Scope</image:title>
      <image:caption>We evaluate your contracts and help assess your controlled unclassified information (CUI) footprint. This will enable the physical, infrastructure and application level boundaries to be defined. Limiting scope is key to long term success and reduced costs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5f25f5be487e654ee4cd871e/t/5f308ed76a5ace51e4f0e302/1597017823593/fleur-dQf7RZhMOJU-unsplash_med.jpg</image:loc>
      <image:title>How We Work - Evaluate and Assess</image:title>
      <image:caption>We evaluate all areas found within scope: reviewing policies and procedures, system walk-throughs, interviewing subject matter experts, evaluating network architecture, system logging and monitoring, and establishing CUI containment and control.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5f25f5be487e654ee4cd871e/t/5f308cbcc4e1bc553141e07b/1597017293157/wonderlane-PBdh9KA2EEA-unsplash_med.jpg</image:loc>
      <image:title>How We Work - Remediation</image:title>
      <image:caption>Our goal is to provide maintainable solutions that minimize the threat vector while demonstrating continued, auditable compliance. We provide remediation for both cloud infrastructure enclaves and physical sites.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5f25f5be487e654ee4cd871e/t/5f308cfee1ef704aebc2ad3f/1597017352502/ipek-aydogdu-t8KQP8uzNrM-unsplash_med.jpg</image:loc>
      <image:title>How We Work - Follow On</image:title>
      <image:caption>No finish line exists in security. Our goal is to help you continually and sustainably prioritize, consolidate, and ensure control of your CUI. We continue to work with you to keep your policies, procedures, and systems up-to-date and secure.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://sajetree.com/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-08-17</lastmod>
  </url>
  <url>
    <loc>https://sajetree.com/book-a-consultation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-10-05</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5f25f5be487e654ee4cd871e/t/5f309569a13a6d7ea80ea6bd/1597435807239/logo-white.gif</image:loc>
      <image:title>Book a Consultation</image:title>
    </image:image>
  </url>
</urlset>

