<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//trendmicro.ilogoindonesia.id/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/news/</loc>
		<lastmod>2026-04-08T09:32:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2024/05/28/hello-world/</loc>
		<lastmod>2024-05-28T09:07:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2024/09/05/panduan-menyusun-kebijakan-keamanan-siber-untuk-ai-generatif/</loc>
		<lastmod>2024-11-05T10:13:51+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2024/09/trendmicro1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2024/08/19/cybersecurity-compass-strategi-pertahanan-siber-yang-terpadu/</loc>
		<lastmod>2024-11-05T10:14:28+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2024/09/trendmicro.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2024/07/02/kelebihan-solusi-attack-surface-risk-management-dari-trend-micro-vision-one/</loc>
		<lastmod>2024-11-05T10:15:05+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2024/09/trend-micro-vision-one.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/05/15/masa-depan-keamanan-siber-inovasi-trend-micro-dalam-melawan-ancaman-digital/</loc>
		<lastmod>2025-05-15T08:27:14+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/05/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/05/22/keunggulan-trend-micro-dalam-melindungi-data-dan-keamanan-jaringan/</loc>
		<lastmod>2025-05-22T16:04:04+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/05/Picture1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/06/01/trend-micro-vs-antivirus-lain-mana-yang-lebih-baik/</loc>
		<lastmod>2025-06-01T14:23:17+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/06/Picture1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/06/04/solusi-trend-micro-untuk-umkm-keamanan-terjangkau-dan-efektif/</loc>
		<lastmod>2025-06-04T09:18:49+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/06/Capture.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/06/13/trend-micro-untuk-sektor-keuangan-proteksi-data-dan-transaksi-yang-kuat/</loc>
		<lastmod>2025-06-13T09:07:39+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/06/Picture1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/06/20/trend-micro-dan-zero-trust-strategi-keamanan-untuk-era-digital/</loc>
		<lastmod>2025-06-20T08:25:57+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/06/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/06/24/memenuhi-regulasi-dan-kepatuhan-dengan-solusi-trend-micro/</loc>
		<lastmod>2025-06-24T08:08:40+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/06/Picture1-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/07/06/automasi-keamanan-siber-bagaimana-trend-micro-mempercepat-deteksi-dan-respon/</loc>
		<lastmod>2025-07-06T16:17:32+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2019/04/network-3524352_1920.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/07/10/melawan-ransomware-dan-malware-dengan-trend-micro-xdr/</loc>
		<lastmod>2025-07-10T07:19:56+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/07/Untitled.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/07/16/keamanan-cloud-dengan-trend-micro-cloud-one-membangun-infrastruktur-aman-dan-fleksibel/</loc>
		<lastmod>2025-07-16T07:02:49+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2021/04/banner-1-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/07/24/trend-micro-apex-one-perlindungan-endpoint-cerdas-untuk-ancaman-masa-kini/</loc>
		<lastmod>2025-07-24T04:50:10+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2021/01/Trend-Micro-Logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/07/31/solusi-keamanan-siber-terpadu-untuk-bisnis-modern/</loc>
		<lastmod>2025-07-31T15:18:01+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/05/Picture1-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/08/07/menghadapi-ancaman-siber-generasi-baru-solusi-adaptif-dari-trend-micro/</loc>
		<lastmod>2025-08-07T10:13:48+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/08/Picture1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/08/19/endpoint-email-cloud-amankan-semua-titik-masuk-dengan-trend-micro-one-platform/</loc>
		<lastmod>2025-08-19T06:38:11+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/08/111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/08/19/multi-layered-defense-strategi-perlindungan-berlapis-untuk-infrastruktur-ti-modern/</loc>
		<lastmod>2025-08-19T06:39:59+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/08/111-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/08/28/trend-micro-vision-one-deteksi-dan-respon-ancaman-lebih-cepat-akurat-untuk-keamanan-organisasi-anda/</loc>
		<lastmod>2025-08-28T04:36:27+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/08/333.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/09/02/trend-micro-vision-one-strategi-deteksi-dan-respons-yang-lebih-proaktif/</loc>
		<lastmod>2025-09-02T07:14:55+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/09/333-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/09/11/kenapa-xdr-lebih-efektif-dari-edr-penjelasan-trend-micro/</loc>
		<lastmod>2025-09-11T09:32:18+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/09/1757582202_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/09/16/integrasi-keamanan-ot-dan-it-peran-trend-micro-di-industri-4-0/</loc>
		<lastmod>2025-09-16T04:54:03+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/09/1757998400_555.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/09/25/ransomware-masih-mengancam-cara-trend-micro-menghadapinya/</loc>
		<lastmod>2025-09-25T16:27:38+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/09/1758817349_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/10/02/keamanan-hybrid-work-solusi-trend-micro-untuk-remote-workforce/</loc>
		<lastmod>2025-10-02T07:44:00+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/10/1759390754_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/10/10/meningkatkan-postur-keamanan-dengan-trend-micro-zero-trust-strategy/</loc>
		<lastmod>2025-10-10T08:34:06+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/10/1760085092_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/10/22/ai-dalam-cybersecurity-bagaimana-trend-micro-memanfaatkan-machine-learning/</loc>
		<lastmod>2025-10-22T04:25:47+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/10/1761105695_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/10/22/tips-mencegah-serangan-phishing-perlindungan-end-to-end-dari-trend-micro/</loc>
		<lastmod>2025-10-22T04:26:46+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/10/1761105864_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/10/29/trend-micro-cloud-one-perlindungan-cloud-native-untuk-multi-cloud-environment/</loc>
		<lastmod>2025-10-29T08:52:49+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/10/1761727620_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/11/06/meningkatkan-keamanan-cloud-dan-container-dengan-trend-micro-cloud-one/</loc>
		<lastmod>2025-11-06T08:05:49+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/11/1762414790_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/11/11/strategi-pertahanan-siber-terpadu-menghadapi-ancaman-ai-driven-malware/</loc>
		<lastmod>2025-11-11T09:33:36+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/11/1762853313_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/11/25/mengamankan-infrastruktur-hybrid-cloud-sebelum-memasuki-tahun-baru/</loc>
		<lastmod>2025-11-25T03:22:56+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/11/1764040379_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/11/25/melindungi-data-perusahaan-dari-serangan-phishing-di-musim-liburan/</loc>
		<lastmod>2025-11-25T03:27:25+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/11/1764040534_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/12/11/mengapa-deteksi-lebih-cepat-menjadi-kunci-dalam-menghadapi-serangan-ransomware/</loc>
		<lastmod>2025-12-11T03:22:27+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/12/1765422415_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/12/23/perlindungan-end-to-end-untuk-endpoint-email-dan-cloud-dengan-trend-vision-one/</loc>
		<lastmod>2025-12-23T06:12:17+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/12/1766469874_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2025/12/23/membangun-budaya-keamanan-siber-di-lingkungan-kerja-digital/</loc>
		<lastmod>2025-12-23T06:13:05+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2025/12/1766469977_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/01/07/integrasi-threat-intelligence-untuk-keamanan-real-time-di-infrastruktur-modern/</loc>
		<lastmod>2026-01-07T07:42:22+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/01/1767769732_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/01/07/ancaman-siber-di-sektor-finansial-cara-proaktif-menghadapi-serangan-targeted/</loc>
		<lastmod>2026-01-07T07:43:20+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/01/1767769857_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/01/19/tren-keamanan-siber-ai-security-zero-trust-dan-automasi-threat-response/</loc>
		<lastmod>2026-01-19T05:14:31+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/01/1768798897_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/01/19/menjaga-privasi-dan-kepatuhan-data-di-era-ai-generatif-bersama-trend-micro/</loc>
		<lastmod>2026-01-19T05:15:14+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/01/1768798995_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/01/30/mengapa-extended-detection-and-response-xdr-adalah-masa-depan-keamanan-ti/</loc>
		<lastmod>2026-01-30T08:57:52+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/01/1769763001_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/02/13/memanfaatkan-xdr-extended-detection-and-response-untuk-analisis-ancaman-lebih-mendalam/</loc>
		<lastmod>2026-02-13T04:48:56+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/02/1770957498_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/02/23/platform-security-terintegrasi-menyatukan-endpoint-cloud-dan-network-dalam-satu-dashboard/</loc>
		<lastmod>2026-02-23T06:44:24+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/02/1771828668_111.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/03/09/future-of-cybersecurity-automation-ai-dan-threat-intelligence-terintegrasi/</loc>
		<lastmod>2026-03-09T08:06:50+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/03/1773043338_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/04/08/strategi-keamanan-untuk-workforce-hybrid-remote-access/</loc>
		<lastmod>2026-04-08T09:31:36+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/04/1775639727_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/04/08/compliance-driven-security-mendukung-iso-27001-regulasi-ojk/</loc>
		<lastmod>2026-04-08T09:32:17+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/04/1775639818_222.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://trendmicro.ilogoindonesia.id/2026/04/08/keamanan-ot-industrial-system-mengamankan-operasional-manufaktur-modern/</loc>
		<lastmod>2026-04-08T09:32:52+00:00</lastmod>
		<image:image>
			<image:loc>http://trendmicro.ilogoindonesia.id/wp-content/uploads/2026/04/1775639908_222.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->