<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://scanner.dev/terms</loc>
    </url>
    <url>
        <loc>https://scanner.dev/privacy</loc>
    </url>
    <url>
        <loc>https://scanner.dev/siem-alternative</loc>
    </url>
    <url>
        <loc>https://scanner.dev</loc>
    </url>
    <url>
        <loc>https://scanner.dev/demo</loc>
    </url>
    <url>
        <loc>https://scanner.dev/about</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events</loc>
    </url>
    <url>
        <loc>https://scanner.dev/pricing</loc>
    </url>
    <url>
        <loc>https://scanner.dev/collect-enrich</loc>
    </url>
    <url>
        <loc>https://scanner.dev/search-investigate</loc>
    </url>
    <url>
        <loc>https://scanner.dev/detect-respond</loc>
    </url>
    <url>
        <loc>https://scanner.dev/mcp-apis</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog</loc>
    </url>
    <url>
        <loc>https://scanner.dev/changelog</loc>
    </url>
    <url>
        <loc>https://scanner.dev/customers</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/7-signs-your-s3-may-be-slowing-down-your-soc</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/a-deep-dive-into-an-incident-response-with-your-security-data-lake</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/advanced-persistent-threats-in-your-security-logs</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/announcing-detection-rules-as-code-with-ci-cd</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/announcing-scanner-for-jupyter-response-as-code-and-advanced-threat-hunting</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/announcing-scanner-for-splunk-lightning-fast-threat-hunting-through-your-s3-logs-directly-from-splunk</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/announcing-scanner-mcp-connect-ai-agents-to-your-security-data</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/announcing-visual-query-builder-and-detection-rule-tags-with-mitre-classification</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/believe-in-serverless-podcast-serverless-speed-rust-vs-go-java-and-python-in-aws-lambda-functions</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/building-your-first-ai-soc-agents-deploying-triage-and-threat-hunting-agents-in-aws-part-2</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/building-your-first-ai-soc-agents-foundations-and-your-first-agent-part-1</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/ciso-series---security-you-should-know-reducing-siem-risk-with-scanner</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/cloud-security-podcast-siem-vs-data-lake-why-we-ditched-traditional-logging</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/cyber-security-tribe-video-interview-the-future-of-siem-a-search-index-in-your-data-lake</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/cyberwire-daily-podcast-the-evolution-of-security-data-lakes-and-the-bring-your-own-data-model-for-security-tools</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/cyberwire-podcast-why-security-data-lakes-are-ideal-for-ai-in-the-soc</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/data-engineering-podcast-build-a-data-lake-for-your-security-logs-with-scanner</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/expanding-security-coverage-new-out-of-the-box-detection-rules-for-12-log-sources</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/faster-querying-basic-aggregations-and-saved-queries</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/getting-started-with-serverless-rust-in-aws-lambda</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/how-not-to-spend-half-a-million-dollars-on-logs</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/how-to-build-a-security-data-lake-agentic-ai-in-secops-part-4</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/how-to-build-a-security-data-lake-detection-engineering-in-data-lakes-part-3</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/how-to-build-a-security-data-lake-etl-and-search-queries-with-high-performance-and-low-overhead-part-2</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/how-to-build-a-security-data-lake-key-challenges-top-tools-and-lessons-learned-part-1</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/how-to-search-your-security-logs-for-threat-indicators-from-the-october-2023-okta-breach</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/introducing-new-statistical-aggregations-average-percentile-variance-and-more</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/monitoring-okta-logs-for-threat-detection-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/not-another-demo-podcast-modern-siem-without-busting-budgets</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/our-test-of-ai-in-the-soc-proves-humans-and-ai-are-better-together</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/ready-set-cloud-podcast-how-scanner-built-an-ultra-fast-serverless-data-lake</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/rustacean-station-podcast-a-conversation-about-scanners-security-data-lake-powered-by-rust</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/scanner-at-blue-team-con-tackling-detection-chaos-with-collect-mcp-and-ai</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/scanner-at-developerweek-2023</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/scanner-dev-on-data-lakes-with-smashing-security-podcast-hosts-graham-cluley-carole-theriault</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/scanner-meets-torq-streamlining-detection-response-and-case-handling</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/scanners-security-data-lake-pushing-hardware-to-its-fundamental-limits</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/security-data-lakes-a-new-tool-for-threat-hunting-detection-response-and-genai-powered-analysis</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/serverless-speed-rust-vs-go-java-and-python-in-aws-lambda-functions</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/taking-on-black-hat-with-something-new</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/the-future-of-detection-where-ai-and-security-operations-intersect</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/the-future-of-siem-why-data-lakes-are-gaining-traction</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/the-team-accelerating-log-analysis-with-rust</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/threat-detection-rules-or-how-to-stop-your-redis-server-from-mining-bitcoin-for-north-korea</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/try-a-threat-investigation-in-scanner-the-playground-environment-is-now-live</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/unapologetically-technical-podcast-with-jesse-anderson</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/we-indexed-a-petabyte-over-a-weekend</loc>
    </url>
    <url>
        <loc>https://scanner.dev/blog/why-fast-moving-security-teams-rely-on-scanner-for-detection-alert-analysis</loc>
    </url>
    <url>
        <loc>https://scanner.dev/customers/floqast-optimizes-high-volume-security-log-analysis-threat-detections</loc>
    </url>
    <url>
        <loc>https://scanner.dev/customers/lemonade-accelerates-security-operations-high-speed-security-data-lake</loc>
    </url>
    <url>
        <loc>https://scanner.dev/customers/ramp</loc>
    </url>
    <url>
        <loc>https://scanner.dev/solutions/aws-cloud-activity-threat-monitoring</loc>
    </url>
    <url>
        <loc>https://scanner.dev/solutions/cloudflare-traffic-investigations</loc>
    </url>
    <url>
        <loc>https://scanner.dev/solutions/reduce-the-cost-of-siem-and-log-search-tools</loc>
    </url>
    <url>
        <loc>https://scanner.dev/solutions/scanner-for-datadog</loc>
    </url>
    <url>
        <loc>https://scanner.dev/solutions/scanner-for-elastic</loc>
    </url>
    <url>
        <loc>https://scanner.dev/solutions/scanner-for-splunk</loc>
    </url>
    <url>
        <loc>https://scanner.dev/solutions/windows-event-threat-detection</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/aws-re-invent-2025</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/bsides-salt-lake-city-2026</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/bsides-san-francisco-2026</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/bsides-seattle-2026</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/bsides312-chicago-2026</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/detections-as-code-webinar</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/rsac-2026</loc>
    </url>
    <url>
        <loc>https://scanner.dev/events/scanner-for-datadog-webinar</loc>
    </url>
    <url>
        <loc>https://scanner.dev/careers/senior-backend-engineer</loc>
    </url>
</urlset>