<?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>managed-siem-services</Name><Prefix></Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated><Contents><Key>14-how-to-get-started-with-outsourced-help-desk-services-from-an-it-support-firm.html</Key><LastModified>2024-09-09T00:53:39.000Z</LastModified><ETag>&quot;f1817f14e5bd6f6b3569d355689fd571&quot;</ETag><Size>101937</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>3-keys-to-a-rock-solid-adaptive-recovery-plan.html</Key><LastModified>2025-05-08T18:43:33.000Z</LastModified><ETag>&quot;34ec8e28ccf11c549e3e7d2c70cad900&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>57796</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>adaptive-recovery-act-now-thrive-in-the-future.html</Key><LastModified>2025-05-08T18:44:08.000Z</LastModified><ETag>&quot;7bdb2dca2fbf078cb4142004db52ba62&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>67907</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>adaptive-recovery-hyper-growth-optimization-tips.html</Key><LastModified>2025-05-08T18:43:45.000Z</LastModified><ETag>&quot;e86d884c785cb3910bdd21b2bb13d893&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>58821</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>advanced-web-filtering-achieve-total-control-with-swg.html</Key><LastModified>2025-06-23T19:47:14.000Z</LastModified><ETag>&quot;b81a88af80f5b4f57853511f65c2f46a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>81778</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>advanced-web-filtering-swg-for-total-control.html</Key><LastModified>2025-06-23T19:46:31.000Z</LastModified><ETag>&quot;748a010e94e6c6cace49a0d6df6cbb58&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95618</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>affordable-cybersecurity-hifences-solutions-for-you.html</Key><LastModified>2025-07-13T18:13:02.000Z</LastModified><ETag>&quot;3cce5d3e2eafbb9c22ac81d6b37dc055&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95322</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>affordable-security-consulting-for-small-business.html</Key><LastModified>2025-07-05T19:11:58.000Z</LastModified><ETag>&quot;fc52e325712cd82c43d0acdd769cc002&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>82998</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>ai-a-pci-the-future-of-payment-security-is-here.html</Key><LastModified>2025-07-02T17:24:05.000Z</LastModified><ETag>&quot;c1e77daa6a96f2e258f5b526c21001d6&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83289</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>ai-and-machine-learning-consulting-implementing-innovative-solutions-in-nyc.html</Key><LastModified>2025-03-31T01:11:23.000Z</LastModified><ETag>&quot;6d786c3d114eca3f92ef36e38226b909&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>147318</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>application-security-consulting-protecting-your-software-from-exploits.html</Key><LastModified>2025-04-23T01:01:18.000Z</LastModified><ETag>&quot;a50676d70bd9ce9961783864f5ab9d09&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>94486</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>beyond-dr-why-recovery-matters-now.html</Key><LastModified>2025-05-08T18:45:49.000Z</LastModified><ETag>&quot;9988c6cb2411fa7cc35ba53a648bbefe&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>57781</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>building-a-robust-cybersecurity-strategy-a-consulting-perspective.html</Key><LastModified>2025-04-23T00:59:06.000Z</LastModified><ETag>&quot;e7e168b5ebfbf5e3eac9d8ddea9714f2&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95850</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>child-privacy-effective-online-safety-strategies.html</Key><LastModified>2025-07-04T18:51:00.000Z</LastModified><ETag>&quot;2c96ab5de8e275c12fe813f4343008d7&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97438</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>child-privacy-law-compliance-guide-for-parents.html</Key><LastModified>2025-07-04T18:51:01.000Z</LastModified><ETag>&quot;d498d8153956e32de4c3abd7ee679c74&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>99465</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>child-privacy-the-new-online-battleground.html</Key><LastModified>2025-07-04T18:48:51.000Z</LastModified><ETag>&quot;f22a21cd203b632f87c7cf7c4d022cc8&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>82495</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>childrens-data-privacy-what-parents-need-to-know.html</Key><LastModified>2025-07-04T18:47:59.000Z</LastModified><ETag>&quot;0cea8a3e782f2476eed9c8ff8d3e8535&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87487</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>compliance-and-regulatory-consulting-for-nyc-financial-institutions-1.html</Key><LastModified>2025-03-31T01:10:48.000Z</LastModified><ETag>&quot;f4735caccb71b5e69ce034d65b4eab62&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>152362</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>compliance-and-regulatory-consulting-for-nyc-financial-institutions.html</Key><LastModified>2025-03-31T01:10:11.000Z</LastModified><ETag>&quot;d03e5497c742e5df7e7104266f010a77&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>137402</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>compliance-and-regulatory-consulting-navigating-cybersecurity-regulations.html</Key><LastModified>2025-04-23T01:01:12.000Z</LastModified><ETag>&quot;fad429143797ca2da46ba03c7b355759&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>94401</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>compliance-and-regulatory-support-for-nyc-businesses.html</Key><LastModified>2025-04-22T00:45:54.000Z</LastModified><ETag>&quot;4133ac471705ed9b9da36d4feea2075a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>91701</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cost-effective-it-solutions-for-non-profits-in-new-york-city.html</Key><LastModified>2025-04-22T00:45:22.000Z</LastModified><ETag>&quot;525835d16bb404c8df8b84cb42c3882d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86635</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cost-effective-it-solutions-for-small-businesses-in-nyc.html</Key><LastModified>2025-04-22T00:43:44.000Z</LastModified><ETag>&quot;69c1f3f89fba2ac152c72b7a1b585bfe&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84641</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cyber-compliance-empower-your-security-team.html</Key><LastModified>2025-05-30T19:06:10.000Z</LastModified><ETag>&quot;912f47a7c9859616ebe3a4f9559242ec&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>101875</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cyber-compliance-keep-your-business-secure.html</Key><LastModified>2025-05-30T19:05:53.000Z</LastModified><ETag>&quot;5a614d4c700a7d72b47867ec948bce13&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>101714</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cyber-compliance-outsmart-emerging-threats.html</Key><LastModified>2025-05-30T19:05:57.000Z</LastModified><ETag>&quot;c18d4f5c82dc49198319429567978e1d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>101951</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybercrime-prevention-hifence-protects-your-business.html</Key><LastModified>2025-07-13T18:12:40.000Z</LastModified><ETag>&quot;77000bca2363fe3a818e4d97bda06902&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97540</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-audit-protecting-your-business-data.html</Key><LastModified>2025-07-05T19:11:47.000Z</LastModified><ETag>&quot;d73d01addbbd44e8395b0ca5c3a83c61&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95006</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-empowering-security-teams.html</Key><LastModified>2025-05-30T19:05:28.000Z</LastModified><ETag>&quot;01086e32d6d761385a2400ff91ec69fc&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>100838</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-meeting-regulations.html</Key><LastModified>2025-05-30T19:04:35.000Z</LastModified><ETag>&quot;b4a915bd8c9c346a7ca1be627404a31d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>102578</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-proactive-threat-defense.html</Key><LastModified>2025-05-30T19:03:48.000Z</LastModified><ETag>&quot;7ec8cbf6c60f7b27aabc534825b50a4a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>89699</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-stay-ahead-of-threats.html</Key><LastModified>2025-05-30T19:05:15.000Z</LastModified><ETag>&quot;aaebb5ffc6aec4628f999059d59b8d22&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>101132</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-support-data-loss-prevention.html</Key><LastModified>2025-05-30T19:03:32.000Z</LastModified><ETag>&quot;cc9287da153947bbe996097535315933&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>104578</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-support-meeting-regulatory-demands.html</Key><LastModified>2025-05-30T19:03:07.000Z</LastModified><ETag>&quot;2942f28f4840c8e49ff85797a1209a60&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86480</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-support-penetration-testing-services.html</Key><LastModified>2025-05-30T19:03:26.000Z</LastModified><ETag>&quot;3729cf0f330a5aa92014e861334db767&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86449</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>cybersecurity-compliance-understanding-pen-tests.html</Key><LastModified>2025-05-30T19:05:35.000Z</LastModified><ETag>&quot;b59e1856a18b5b5795d3cf9c98e722ec&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>88989</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>data-analytics-consulting-unlocking-insights-for-nycs-competitive-edge.html</Key><LastModified>2025-03-31T01:11:19.000Z</LastModified><ETag>&quot;3b60eebfa366594ad6982e6e3dbe5b34&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>134523</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>data-driven-recovery-adaptive-success-strategies.html</Key><LastModified>2025-05-08T18:44:33.000Z</LastModified><ETag>&quot;1453b8729a008025d9403bca67769f62&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>59559</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>digital-transformation-consulting-for-nycs-competitive-landscape.html</Key><LastModified>2025-03-31T01:12:45.000Z</LastModified><ETag>&quot;aa3a6d58ca9980bcb885a63fe0b33f8c&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>137592</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>diy-disaster-plan-adaptive-recovery-on-a-budget.html</Key><LastModified>2025-05-08T18:44:15.000Z</LastModified><ETag>&quot;d4f0015cacb2974a58d05af1d988a886&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>58409</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>emerging-technologies-influencing-the-landscape-of-local-it-support.html</Key><LastModified>2024-09-09T01:17:41.000Z</LastModified><ETag>&quot;6387732cac6a43451f0b1ac4bb2168bf&quot;</ETag><Size>102339</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>emotionalcuriosity-hooks-2.html</Key><LastModified>2025-05-08T18:44:48.000Z</LastModified><ETag>&quot;734ccd0eff7a57c428ca10b25ce98c5c&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>67042</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>feed.xml</Key><LastModified>2024-09-09T01:23:26.000Z</LastModified><ETag>&quot;83323b3a3e44b6bbf306a3b877cddd22&quot;</ETag><Size>415634</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>future-trends-in-cybersecurity-consulting-services.html</Key><LastModified>2025-04-23T01:00:00.000Z</LastModified><ETag>&quot;a51101da6665aea99b4fb80fdbcdeddf&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84107</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>future-trends-in-the-field-of-managed-siem-services.html</Key><LastModified>2024-01-21T13:14:38.000Z</LastModified><ETag>&quot;2f223b91581d7e058bb5b0dbf9ea46a3&quot;</ETag><Size>45043</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>here-are-15-1.html</Key><LastModified>2025-03-19T20:08:44.000Z</LastModified><ETag>&quot;3578f0ff5e34b6113fa6e5017c98f9da&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>80151</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>hifence-2025-cybersecurity-forecast-be-prepared.html</Key><LastModified>2025-07-13T18:10:46.000Z</LastModified><ETag>&quot;8b1613b2d3e1d87f67042aba8e8b03ac&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86614</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>hifence-cybersecurity-secure-your-remote-workforce.html</Key><LastModified>2025-07-13T18:10:36.000Z</LastModified><ETag>&quot;71087475817aa5bd86f69d689eb0f826&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>85709</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>holistic-pci-a-complete-approach-to-security.html</Key><LastModified>2025-07-02T17:22:35.000Z</LastModified><ETag>&quot;e17708af5c782942fa4c2c98675f9751&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>88197</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-budget-for-cybersecurity-consulting-services-4.html</Key><LastModified>2025-04-23T01:01:34.000Z</LastModified><ETag>&quot;f236ef90b6ba7b7bd807a46798b4456c&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>82162</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-choose-a-managed-services-provider-for-small-businesses-in-nyc.html</Key><LastModified>2025-04-22T00:43:31.000Z</LastModified><ETag>&quot;87951f41ebb0d6240cfda5f090e45d22&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>96744</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-determine-if-you-need-a-managed-service-provider.html</Key><LastModified>2025-03-19T20:07:50.000Z</LastModified><ETag>&quot;d195a71dc481338294009ef26997eaaf&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>82344</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-get-the-most-out-of-your-managed-services-provider-in-nyc.html</Key><LastModified>2025-04-22T00:46:50.000Z</LastModified><ETag>&quot;350868d061776c9719a2d540e02423ce&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86437</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-integrate-a-new-msp-with-existing-systems-in-nyc.html</Key><LastModified>2025-04-22T00:44:41.000Z</LastModified><ETag>&quot;15737184003b977384469435451f2e06&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>85175</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-integrate-cybersecurity-consulting-recommendations-2.html</Key><LastModified>2025-04-23T01:01:38.000Z</LastModified><ETag>&quot;61d6139c079782b38269af90dfdf7876&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>93351</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-leverage-cloud-computing-with-a-managed-it-services-partner-in-nyc.html</Key><LastModified>2024-09-09T01:25:18.000Z</LastModified><ETag>&quot;5f9f45bf52823eb334e20d006384b3d3&quot;</ETag><Size>103636</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-manage-remote-workforces-with-a-managed-services-provider-in-nyc.html</Key><LastModified>2025-04-22T00:46:23.000Z</LastModified><ETag>&quot;a701702f31b8fd805f12fef58347ddee&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>85460</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-measure-success.html</Key><LastModified>2025-03-19T20:10:40.000Z</LastModified><ETag>&quot;079369f1a7fd71bc69a7df4b3338e207&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>90007</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-negotiate-a-managed-service-provider-contract-effectively.html</Key><LastModified>2025-03-19T20:08:18.000Z</LastModified><ETag>&quot;86929ee4d9370f0029e2d8bb558baac6&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>80592</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-negotiate-it-consulting-rates-in-nyc-1.html</Key><LastModified>2025-03-31T01:11:13.000Z</LastModified><ETag>&quot;dd0a1c7f6d16a59249eba0c9cf086a73&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>145372</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-prepare-for-a-cybersecurity-consulting-engagement-1.html</Key><LastModified>2025-04-23T00:58:58.000Z</LastModified><ETag>&quot;b4008b001d3d86317c2ed5ee8a5f9399&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83857</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-stay-ahead-of-technology-trends-with-managed-it-support-in-new-york-city.html</Key><LastModified>2024-09-09T01:19:13.000Z</LastModified><ETag>&quot;524a4ed007b56c3b39d865d1356eba67&quot;</ETag><Size>102880</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-stay-one-step-ahead-of-hackers-leverage-the-power-of-managed-siem-solutions.html</Key><LastModified>2024-01-21T13:14:29.000Z</LastModified><ETag>&quot;68f24cdf453bb9a2fa383e9fa28a88c1&quot;</ETag><Size>49492</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>how-to-streamline-your-operations-with-managed-it-services-in-new-york.html</Key><LastModified>2024-09-09T01:21:37.000Z</LastModified><ETag>&quot;9b3ebf15ae8928c2412451b76493a10b&quot;</ETag><Size>102322</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-0.jpg</Key><LastModified>2024-09-09T01:23:24.000Z</LastModified><ETag>&quot;d6fd8a07ddb0d78ae50b7cfcbf874345&quot;</ETag><Size>191166</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-1.jpg</Key><LastModified>2024-09-09T01:23:24.000Z</LastModified><ETag>&quot;1f50263ccdf1008b4237fbecb27fbbd6&quot;</ETag><Size>194457</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-2.jpg</Key><LastModified>2024-09-09T01:23:24.000Z</LastModified><ETag>&quot;2fc8f77d7bdd0c54581b2d59ee9fa9e4&quot;</ETag><Size>169908</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-3.jpg</Key><LastModified>2024-09-09T01:23:24.000Z</LastModified><ETag>&quot;a496aa1f0d4dce95d7aaa338224a674b&quot;</ETag><Size>196517</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-4.jpg</Key><LastModified>2024-09-09T01:23:25.000Z</LastModified><ETag>&quot;322b91689bb51ede3420ecbde0997f0d&quot;</ETag><Size>225371</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-5.jpg</Key><LastModified>2024-09-09T01:23:25.000Z</LastModified><ETag>&quot;a467a705fb863ad5f4c1b7b27249582e&quot;</ETag><Size>208210</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-6.jpg</Key><LastModified>2024-09-09T01:23:25.000Z</LastModified><ETag>&quot;e654b8cde4be6b254c6dc463f6d65764&quot;</ETag><Size>198488</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-7.jpg</Key><LastModified>2024-09-09T01:23:25.000Z</LastModified><ETag>&quot;ba7c77a911f9d8e48a71f6b97da0d498&quot;</ETag><Size>164458</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-8.jpg</Key><LastModified>2024-09-09T01:23:25.000Z</LastModified><ETag>&quot;9ed2b11365c736122229a0274a9f2536&quot;</ETag><Size>151020</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>img/managed it services new york city-9.jpg</Key><LastModified>2024-09-09T01:23:26.000Z</LastModified><ETag>&quot;a3e7493f2e2552b95c53b0cc72859ff0&quot;</ETag><Size>207442</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>improve-governance-rmf-consulting-strategies.html</Key><LastModified>2025-07-05T19:09:45.000Z</LastModified><ETag>&quot;1c0db397b3b08b2c04260c46358cee21&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>96736</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>improve-security-rmf-consulting-best-practices.html</Key><LastModified>2025-07-05T19:12:04.000Z</LastModified><ETag>&quot;5e1a2dfe4cfe2987a6ebca747d645740&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95196</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>increase-roi-the-power-of-rmf-consulting.html</Key><LastModified>2025-07-05T19:09:39.000Z</LastModified><ETag>&quot;1376746b33b1a36f94f6084e4538189e&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95732</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>integrating-remote-work-solutions-with-managed-it-services-for-nyc-organizations.html</Key><LastModified>2024-09-09T01:19:46.000Z</LastModified><ETag>&quot;e3e868b6647e8b099c2030a6fddf369d&quot;</ETag><Size>102749</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>is-your-business-pci-compliant-find-out-now.html</Key><LastModified>2025-07-02T17:20:48.000Z</LastModified><ETag>&quot;04dabc436d775f0a621730874295cc9e&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84346</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>is-your-childs-online-data-being-sold.html</Key><LastModified>2025-07-04T18:48:11.000Z</LastModified><ETag>&quot;85e873eb7200494f574e2c4d5d05a0c3&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>85311</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>is-your-insurance-enough-hifence-cybersecurity-insights.html</Key><LastModified>2025-07-13T18:11:08.000Z</LastModified><ETag>&quot;7adf17efa7eda252d5b084105bbe7ce6&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86255</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>is-your-security-strong-enough-go-beyond-pci.html</Key><LastModified>2025-07-02T17:22:26.000Z</LastModified><ETag>&quot;c0a132c9f537a9cbf66047ea606b6fb8&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>94069</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>it-project-management-consulting-ensuring-success-in-nyc-1.html</Key><LastModified>2025-03-31T01:13:25.000Z</LastModified><ETag>&quot;e87bf9a314f4490fd19aff5740f75e78&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>148222</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>it-staff-augmentation-solutions-in-the-nyc-tech-market.html</Key><LastModified>2025-03-31T01:10:49.000Z</LastModified><ETag>&quot;71b12a8a1c730597b9d873bf2bc8c3db&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>150242</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>it-strategy-consulting-aligning-technology-with-nyc-business-goals-1.html</Key><LastModified>2025-03-31T01:12:02.000Z</LastModified><ETag>&quot;a4b870664dc735b976f9bbda18108a4b&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>146492</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>kids-online-privacy-predicting-the-future-landscape.html</Key><LastModified>2025-07-04T18:48:40.000Z</LastModified><ETag>&quot;9915b29b32382929a285f17c01d2d402&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>86624</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>latest-trends-in-it-support-services.html</Key><LastModified>2024-09-09T01:17:30.000Z</LastModified><ETag>&quot;9e8cdb91b327e82b577bd8f311779a1d&quot;</ETag><Size>102415</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>managed-cloud-services-options-available-for-companies-in-new-york.html</Key><LastModified>2024-09-09T01:24:27.000Z</LastModified><ETag>&quot;0c9a9272c3af486ebc23d44380ce294b&quot;</ETag><Size>101553</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>online-dangers-hidden-threats-to-children.html</Key><LastModified>2025-07-04T18:50:53.000Z</LastModified><ETag>&quot;b14478b36122aaef21ae1d70ed8e940b&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>85796</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>online-privacy-top-tips-for-keeping-kids-safe.html</Key><LastModified>2025-07-04T18:51:22.000Z</LastModified><ETag>&quot;c46fad11e06fd34bf127250055055a14&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87628</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>opinionthought-leadership-1.html</Key><LastModified>2025-05-08T18:43:35.000Z</LastModified><ETag>&quot;7597e3e584b4da1b7b7954a0fd319933&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>66673</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>outsourcing-vs-in-house-it-support-in-nyc.html</Key><LastModified>2024-09-09T01:19:41.000Z</LastModified><ETag>&quot;793d7f976f967f63d9a99f6a31447afd&quot;</ETag><Size>101224</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>pci-a-trust-build-customer-confidence-through-security-1.html</Key><LastModified>2025-07-02T17:23:54.000Z</LastModified><ETag>&quot;8cf258895e66a4464b23a62408db461f&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>78724</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>pci-compliance-a-journey-not-a-destination.html</Key><LastModified>2025-07-02T17:21:21.000Z</LastModified><ETag>&quot;6987e97b2a141e642ec4f169da90554f&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83082</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>pci-compliance-building-a-culture-of-security.html</Key><LastModified>2025-07-02T17:21:14.000Z</LastModified><ETag>&quot;178dff3451f4c8b37cfeae238cafbb73&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>96761</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>pci-for-small-business-a-simple-checklist.html</Key><LastModified>2025-07-02T17:22:07.000Z</LastModified><ETag>&quot;42235d64e8c763f65d9a1039a96c6491&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>94142</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>pci-holistic-a-360-degree-approach-to-security.html</Key><LastModified>2025-07-02T17:21:59.000Z</LastModified><ETag>&quot;a306bff9c8a9542a91383632ed88a8e1&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>93610</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>prevent-data-loss-secure-web-gateways.html</Key><LastModified>2025-06-23T19:46:02.000Z</LastModified><ETag>&quot;4225e9c80c070fc0f6ac99165f58789f&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97208</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>recovery-now-dont-wait-protect-your-biz.html</Key><LastModified>2025-05-08T18:46:07.000Z</LastModified><ETag>&quot;68ed6a5aafb83ae62122e7e703d542eb&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>67388</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>remote-monitoring-and-management-for-it-systems.html</Key><LastModified>2024-09-09T01:21:40.000Z</LastModified><ETag>&quot;3c5789b0d56fcf7cf59d9067ba1079ed&quot;</ETag><Size>102150</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>risk-management-framework-consulting-the-future-is-here.html</Key><LastModified>2025-07-05T19:08:48.000Z</LastModified><ETag>&quot;28789dd40831399fa0873b9cc4557736&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>99215</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>rmf-consulting-addressing-emerging-threats-in-2025.html</Key><LastModified>2025-07-05T19:09:03.000Z</LastModified><ETag>&quot;33b900a6242567cb6050293d30f079aa&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84116</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>rmf-consulting-comprehensive-security-solutions.html</Key><LastModified>2025-07-05T19:10:29.000Z</LastModified><ETag>&quot;1257ee0f9d58048d9164463b7a11c957&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84162</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>rmf-consulting-sustainable-security-for-long-term-growth.html</Key><LastModified>2025-07-05T19:11:07.000Z</LastModified><ETag>&quot;a03fef30c6b99e9eb334d12e91ec21fa&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>82598</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>role-of-automation-in-enhancing-it-support-services.html</Key><LastModified>2024-09-09T01:17:54.000Z</LastModified><ETag>&quot;ae7cc1295fb179658937a10a16162dac&quot;</ETag><Size>100539</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>scalability-and-flexibility-with-managed-it-services.html</Key><LastModified>2024-09-09T01:24:52.000Z</LastModified><ETag>&quot;bac4148dd8d991f10a1d59641e63a02f&quot;</ETag><Size>103529</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>small-business-cybersecurity-hifences-solutions.html</Key><LastModified>2025-07-13T18:13:37.000Z</LastModified><ETag>&quot;a250a0595b8ba03b89c2fe1721357e7a&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97096</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>strategies-for-improving-efficiency-in-it-support-workflows.html</Key><LastModified>2024-09-09T01:07:54.000Z</LastModified><ETag>&quot;764ccb49c68a1cd77101921a73a44ca9&quot;</ETag><Size>101222</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>swg-exposing-hidden-cyber-risks-online.html</Key><LastModified>2025-06-23T19:45:34.000Z</LastModified><ETag>&quot;1921d8bbfbc8821f15a71da18e92ca48&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97075</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>swg-is-it-worth-the-cost-the-roi-analysis.html</Key><LastModified>2025-06-23T19:45:04.000Z</LastModified><ETag>&quot;4574433a6a1023ca1bab8a37517961d9&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>82767</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>swg-your-web-security-first-line-of-defense.html</Key><LastModified>2025-06-23T19:48:01.000Z</LastModified><ETag>&quot;cf9b442b3e7dd79338d6f5c8cb9cdbf1&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>96267</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>test.txt</Key><LastModified>2025-07-13T18:04:47.000Z</LastModified><ETag>&quot;d41d8cd98f00b204e9800998ecf8427e&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>0</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>the-future-of-managed-it-services-in-nyc-and-beyond.html</Key><LastModified>2024-09-09T01:20:46.000Z</LastModified><ETag>&quot;0cf8f5b146c7b10c8de88d695df5425f&quot;</ETag><Size>103894</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>the-future-of-msps-trends-and-predictions.html</Key><LastModified>2025-03-19T20:07:55.000Z</LastModified><ETag>&quot;ddff998bbe47d92dddcd08005d39de6d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>90820</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>the-role-of-ai-and-machine-learning-in-cybersecurity-consulting-1.html</Key><LastModified>2025-04-23T01:01:54.000Z</LastModified><ETag>&quot;1a2a48005c24e4c22bc940cc02c3d8f8&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83963</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>threat-intelligence-and-analysis-staying-ahead-of-emerging-threats.html</Key><LastModified>2025-04-23T00:58:36.000Z</LastModified><ETag>&quot;2499859d91632e81755fa680cef8b22f&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97030</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>top-privacy-settings-your-childs-must-do-checklist.html</Key><LastModified>2025-07-04T18:49:28.000Z</LastModified><ETag>&quot;c3d8c4a08f16f0c8161c6a276594371d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97463</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>web-gateway-security-protecting-sensitive-data.html</Key><LastModified>2025-06-23T19:47:30.000Z</LastModified><ETag>&quot;566da31b9470c98ea6d7e217807671ae&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>97853</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-cloud-management-by-an-msp-in-nyc.html</Key><LastModified>2025-04-22T00:45:30.000Z</LastModified><ETag>&quot;b3f293d3be6534ba606da65eadced873&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95764</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-compliance-consulting-1.html</Key><LastModified>2025-04-23T01:00:07.000Z</LastModified><ETag>&quot;b41b982dfee6e55808a93480fddccd1e&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84478</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-data-analytics-consulting-in-nyc-5.html</Key><LastModified>2025-03-31T01:13:07.000Z</LastModified><ETag>&quot;6f68872b792a0cc818d4a3b60349e0e9&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>154453</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-data-backup-recovery-offered-by-nyc-msps.html</Key><LastModified>2025-04-22T00:45:00.000Z</LastModified><ETag>&quot;21cec332b7112c69b89eda7467c64a10&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87558</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-erp-consulting-in-nyc-2.html</Key><LastModified>2025-03-31T01:12:26.000Z</LastModified><ETag>&quot;fe0d305744c88f9107014b604771790d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>149321</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-help-desk-support-provided-by-nyc-msps.html</Key><LastModified>2025-04-22T00:44:59.000Z</LastModified><ETag>&quot;352be7bf641876f36b9b789530fa7080&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>84318</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-it-consulting-in-nyc-6.html</Key><LastModified>2025-03-31T01:13:33.000Z</LastModified><ETag>&quot;3aca92e2c26dd5561f8eac2ea253604d&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>153305</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-lurking-in-your-logs-stay-one-step-ahead-with-managed-siem-services.html</Key><LastModified>2024-01-21T13:14:19.000Z</LastModified><ETag>&quot;a63ed5c3294144df373adf0d16d4a89a&quot;</ETag><Size>48452</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-managed-it-services-in-nyc.html</Key><LastModified>2025-03-31T01:09:40.000Z</LastModified><ETag>&quot;e8071fbcab3d0ea5afc5d50395274cd3&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>132468</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-managed-it-support-and-how-can-it-help-streamline-operations.html</Key><LastModified>2024-09-09T01:15:11.000Z</LastModified><ETag>&quot;b7393f617bf6c6e9eb9c6f1cef362ece&quot;</ETag><Size>100924</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-network-security-consulting.html</Key><LastModified>2025-04-23T00:58:05.000Z</LastModified><ETag>&quot;03de29c7f027087e552142a87dc19032&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83409</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-proactive-it-management-from-an-nyc-msp.html</Key><LastModified>2025-04-22T00:46:03.000Z</LastModified><ETag>&quot;8426328cd4fd77fa6d7b2e3261b811bd&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>87574</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-risk-management-in-cybersecurity.html</Key><LastModified>2025-04-23T00:59:23.000Z</LastModified><ETag>&quot;e5220e32a7ee5abce9340df6ec0de502&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95614</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-benefit-of-using-an-msp-for-cloud-services.html</Key><LastModified>2025-03-19T20:08:57.000Z</LastModified><ETag>&quot;6761dec5ce4b2ed10f0d6e6676c73a69&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>79579</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-difference-between-cybersecurity-consulting-and-managed-services.html</Key><LastModified>2025-04-23T00:58:50.000Z</LastModified><ETag>&quot;73e010ecf2c35648607d5daebdc4bfa1&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>95303</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-future-of-it-consulting-in-nyc.html</Key><LastModified>2025-03-31T01:09:48.000Z</LastModified><ETag>&quot;4d6ca603062b1c7b94179e2e879c77db&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>151636</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-importance-of-managed-it-services-in-new-york-city.html</Key><LastModified>2024-09-09T01:23:22.000Z</LastModified><ETag>&quot;5ec1aee29990a2c9fabf446b0dd0f311&quot;</ETag><Size>102674</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-the-process-for-selecting-a-reliable-it-support-provider.html</Key><LastModified>2024-09-09T01:23:58.000Z</LastModified><ETag>&quot;f070b3ddd933590e6bfec6756f3fb3bf&quot;</ETag><Size>102026</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-vendor-management.html</Key><LastModified>2025-03-19T20:08:12.000Z</LastModified><ETag>&quot;00e32b47946fc91d4f1bbba0650dc9a3&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>80275</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-role-does-cybersecurity-play-in-it-support-services-in-nyc.html</Key><LastModified>2024-09-09T01:16:28.000Z</LastModified><ETag>&quot;2d79b338450346fe26285294423e60fb&quot;</ETag><Size>101173</Size><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>why-child-privacy-matters-essential-insights-for-today.html</Key><LastModified>2025-07-04T18:49:59.000Z</LastModified><ETag>&quot;67172ded1a2d91d17e990d3cba7c9659&quot;</ETag><ChecksumAlgorithm>CRC64NVME</ChecksumAlgorithm><ChecksumType>FULL_OBJECT</ChecksumType><Size>83123</Size><StorageClass>STANDARD</StorageClass></Contents></ListBucketResult>