<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://eshare.com</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/about</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/addin-support</loc>
    </url>
    <url>
        <loc>https://eshare.com/blog</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/contact</loc>
    </url>
    <url>
        <loc>https://eshare.com/electronic-records-and-signatures</loc>
    </url>
    <url>
        <loc>https://eshare.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://eshare.com/proofpoint-phishing-attack-shield</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/schedule-a-demo</loc>
    </url>
    <url>
        <loc>https://eshare.com/search</loc>
    </url>
    <url>
        <loc>https://eshare.com/support-performance-data-protection</loc>
    </url>
    <url>
        <loc>https://eshare.com/terms-of-service</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/careers-greece</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/careers-usa</loc>
    </url>
    <url>
        <loc>https://eshare.com/partnerships-and-use-cases</loc>
    </url>
    <url>
        <loc>https://eshare.com/insights/state-of-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/insights/insights</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-the-ultimate-kiteworks-replacement-for-enhanced-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-the-superior-alternative-to-avepoint</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/bdr</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-analyze</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-collaborate</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-integrate</loc>
    </url>
    <url>
        <loc>https://eshare.com/m365-investment-maximization-solution</loc>
    </url>
    <url>
        <loc>https://eshare.com/accelerate-modern-collaboration-solution</loc>
    </url>
    <url>
        <loc>https://eshare.com/modernize-information-governance-solution</loc>
    </url>
    <url>
        <loc>https://eshare.com/insights/how-zero-trust-creates-trusted-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-govern-90-day-trial</loc>
    </url>
    <url>
        <loc>https://eshare.com/join-eshare-at-gartner-digital-workplace-summit-london-uk-2025</loc>
    </url>
    <url>
        <loc>https://eshare.com/cmmc-compliance</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-govern</loc>
    </url>
    <url>
        <loc>https://eshare.com/gxp-compliance</loc>
    </url>
    <url>
        <loc>https://eshare.com/why-switch-from-box-to-eshare-for-microsoft-365-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/industries/eshare-for-aerospace-and-defense</loc>
    </url>
    <url>
        <loc>https://eshare.com/industries/eshare-for-pharma</loc>
    </url>
    <url>
        <loc>https://eshare.com/industries/eshare-for-health-insurance</loc>
    </url>
    <url>
        <loc>https://eshare.com/faq</loc>
    </url>
    <url>
        <loc>https://eshare.com/trusted-collaboration-fabric</loc>
    </url>
    <url>
        <loc>https://eshare.com/insights/rethinking-secure-sharing-in-aerospace</loc>
    </url>
    <url>
        <loc>https://eshare.com/dedicated-storage-without-compromise</loc>
    </url>
    <url>
        <loc>https://eshare.com/certifications</loc>
    </url>
    <url>
        <loc>https://eshare.com/company/contact-support</loc>
    </url>
    <url>
        <loc>https://eshare.com/industries/eshare-for-financial-services</loc>
    </url>
    <url>
        <loc>https://eshare.com/library</loc>
    </url>
    <url>
        <loc>https://eshare.com/insights/the-threat-hiding-in-plain-sight-sanctioned-external-sharing-as-attack-surface-wp</loc>
    </url>
    <url>
        <loc>https://eshare.com/automatic-governance-for-automated-workflows</loc>
    </url>
    <url>
        <loc>https://eshare.com/insights/positioning-external-data-sharing-risks</loc>
    </url>
    <url>
        <loc>https://eshare.com/eshare-collaboration-attack-surface-assessment</loc>
    </url>
    <url>
        <loc>https://eshare.com/trusted-sharing-for-teams-chat</loc>
    </url>
    <url>
        <loc>https://eshare.com/features/data-attributes</loc>
    </url>
    <url>
        <loc>https://eshare.com/features/trusted-sharing-for-teams-chat</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/andreas-porevopoulos</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/arthur-braunstein</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/bill-fletcher</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/chakra-bokkisam</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/courtney-lelinho</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/danny-n-poisson</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/emmanuel-minas</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/eshare</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/harry-eliopoulos</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/ilya-pozharsky</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/jacqui-nevils</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/john-kopellas</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/john-paglierani</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/mark-cassetta</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/marko-antic</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/mike-towers</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/nick-stamos</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/ravi-thatavarthy</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/samhitha-thatavarthy</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/tom-murphy</loc>
    </url>
    <url>
        <loc>https://eshare.com/author/tony-themelis</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/ecollection-of-product-data-for-streamlined-supply-chain-management</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/enabling-external-collaboration-for-one-of-the-largest-asset-managers-in-the-world</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/file-sharing-with-customers-from-teams-sharepoint-online-by-an-enterprise-and-sharepoint-online-by-an-enterprise-software-solution-provider</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/how-a-leading-multi-brand-international-retailer-securely-and-reliably-shares-sensitive-data-with-suppliers-consumers-partners</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/improving-customer-experience-and-operational-efficiency-through-a-re-imagining-of-secure-email</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/investor-document-protection-and-engagement-reporting-and-analytics</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/securely-enabling-emerging-market-growth</loc>
    </url>
    <url>
        <loc>https://eshare.com/success-stories/sharing-case-files-with-doj-and-other-law-enforcement-agencies</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/4-ways-to-measure-secure-data-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/5-risk-factors-fueling-accidental-data-breaches</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/7-strategies-to-reduce-reliance-on-third-party-file-transfer-services-while-improving-security-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/75-believe-biggest-risks-in-cloud-storage-email-solutions</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/a-new-era-of-file-sharing-eshare-m365-integration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/a-question-of-policy</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/a-simple-graphic</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/abac-iam-and-eshare-navigating-the-zero-trust-world</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/achieving-trusted-collaboration-in-the-ai-era-a-new-governance-mindset</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/advanced-analytics-for-external-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/ai-risks-and-how-to-mitigate-them</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/alternatives-to-box-why-microsoft-native-eshare-is-the-smarter-choice</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/amazon-workdocs-is-shutting-down-looking-for-an-alternative-discover-trusted-collaboration-with-eshare</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/applying-nist-800-171-controls-to-external-document-sharing-workflows-a-practical-guide</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/be-the-bridge-not-the-blocker</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/breaking-down-the-walls-of-teams-chat</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/can-you-fax-it-to-us</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/cmmc-compliance-with-eshare-and-microsoft-365-gcc</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/create-a-virtual-data-room-in-one-minute</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/delving-into-the-external-sharing-challenges-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/digital-employee-experience-dex-navigating-the-intersection-of-technology-and-work-life</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/digital-hr-the-paystub</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/drive-partnerships-with-zero-trust</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/e-share-announces-general-availability-of-our-next-generation-secure-mail-gateway-smg</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/e-share-bot-for-microsoft-teams-compliantly-incorporates-external-parties-in-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/e-share-case-study-how-a-health-insurer-streamlined-their-reporting-to-centers-for-medicaid-and-medicare-services-cms-reducing-manpower-costs-by-90</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/e-share-collaboration-bot-now-available-in-ms-teams-store-appsource</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/e-share-secure-external-collaboration-trials-now-in-ms-appsource</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/edit-share-subject-view-office-docs-online-private-conversation-mode</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/embracing-the-art-of-laziness-how-eshare-lets-cisos-and-cios-kick-back</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/embracing-the-shift</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/enable-external-sharing-in-the-new-dropbox</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/encryption-is-not-enough</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/exploring-the-vast-universe-of-external-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/extend-your-file-sharing-and-content-collaboration-to-include-3rd-parties</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/external-collaboration-use-cases-for-microsoft-teams-without-enabling-guest-access</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/forging-a-strong-alliance</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/from-chaos-to-empowerment-rethinking-governance-in-the-digital-workplace</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/from-policy-to-practice-fedramp-aligned-external-sharing-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/future-trends-in-secure-data-collaboration-and-how-eshare-is-leading-the-way</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/good-point-sharing-with-vendors</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/happy-data-privacy-day-celebrate-by-protecting-employee-data</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-can-pharma-companies-share-clinical-trial-data-securely</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-do-i-extend-native-dlp-or-governance-tools-to-control-external-user-access</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-eshare-solves-m365-copilot-security-blind-spots</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-eshare-solves-the-microsoft-365-copilot-adoption-crisis</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-microsoft-365-eshare-collaborate-merge-productivity-with-security</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-not-to-communicate-with-customers</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-to-prevent-data-duplication-when-sharing-files-externally</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/how-to-securely-share-large-files-without-moving-them-to-third-party-tools</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/keep-your-external-collaborations-secure-and-on-track-with-e-share-and-microsoft-power-bi</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/lessons-learned-deploying-mip-labeling</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/making-the-shift-to-eshare</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/maximizing-security-and-efficiency</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/mitigating-m365-copilot-security-risks-why-47-of-it-leaders-are-concerned</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/modernizing-data-loss-prevention-for-seamless-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/moving-on-from-moveit</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/navigating-the-future-of-remote-work-zero-trust-and-the-new-norms-of-data-security</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/new-enterprise-api-data-sheet</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/new-portal-updates-sharepoint-bot-support-openid-tweaks</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/new-replace-your-fax-with-share-with-me-links</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/podcast-what-is-your-microsoft-o365-data-protection-strategy</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/privacy-security-drive-modern-innovation</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/reduce-phishing-attacks-and-collaborate-more-securely-with-e-share</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/reducing-the-surface-area-of-attack-in-information-security</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/revolutionizing-data-exchange-the-new-dawn-of-smart-secure-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/revolutionizing-dlp-in-modern-collaboration-environments</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/revolutionizing-the-total-cost-of-compliance</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/sdi-selects-e-share-for-inclusion-in-supplier-catalog-management-service</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/secure-collaboration-in-defense-manufacturing-overcoming-the-barriers-to-trusted-data-sharing</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/secure-data-collaboration-using-mip-sensitivity-labels</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/secure-external-collaboration-that-scales-to-fortune-100-needs</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/secure-external-sharing-for-cmmc-level-2-dfars-in-m365-gcc-high</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/secure-link-sharing-in-m365-with-eshare-collaborate</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/secure-mail-gateway-simple-reliable</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/securing-bpo-data-entry-using-e-share-apis</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/securing-peak-efficiency-in-a-cyber-vulnerable-world</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/security-and-governance-risks-in-microsoft-365-copilot---and-how-to-solve-them</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/share-subject-delivery-status</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/sharing-collaboration-in-the-age-of-epidemics</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/sharing-precious-sensitive-data-at-the-cybercrime-tipping-point</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/sharing-use-cases-policies</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/so-someone-reported-a-security-incident</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/support-for-login-w-openid</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/support-the-mission-by-enabling-external-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/teach-your-technology-to-see</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-attack-surface-nobody-talks-about</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-changing-role-of-cisos-in-technology-decision-making</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-cost-of-complexity-how-disjointed-tools-impair-external-collaboration-across-roles</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-future-of-remote-work-embracing-iam-and-zero-trust-in-compliance-with-government-policies</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-future-of-secure-collaboration-balancing-agility-with-governance</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-hidden-barrier-to-m365-copilot-adoption-weak-information-governance</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-hidden-cost-of-playing-20-questions</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-journey-to-cloud</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-mission-takes-priority</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-pitfalls-of-using-separate-microsoft-365-tenants-for-external-sharing</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-security-of-expiration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-tale-of-secure-and-prosperous-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-time-value-of-data</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-ultimate-guide-to-secure-external-sharing-in-2025</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/the-zero-trust-security-model-eshares-approach</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/three-reasons-data-centric-security-finally-enables-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/three-simple-questions</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/top-3-reasons-secure-data-collaboration-is-disrupting-information-security</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/top-5-reasons-external-file-sharing-is-difficult-and-what-to-do-about-it</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/top-5-reasons-to-replace-all-email-attachments-with-links</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/transitioning-from-proofpoint-secure-share-to-eshare-navigating-the-new-landscape-of-secure-communication</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/trust-ai-and-cybercrime</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/trusted-shares-a-simpler-safer-way-to-share-in-m365</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/trusted-sharing-from-sharepoint</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/understanding-the-role-of-eshare-in-modern-data-governance-for-microsoft-365</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/unleashing-the-power-of-data-and-analytics-in-secure-external-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/unlocking-ais-full-potential</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/unpacking-the-inefficacy-of-email-for-modern-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/viewer-downloader</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/virtual-collaboration-in-the-enterprise-how-to-keep-teams-engaged-productive-secure</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-are-modern-replacements-for-guest-accounts-in-workplace-collaboration-platforms</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-are-secure-alternatives-to-encrypted-email-portals</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-are-secure-alternatives-to-external-file-sharing-platforms-for-regulated-enterprise-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-does-riding-a-horse-have-to-do-with-modern-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-if-your-auditor-was-hacked</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-if-your-collaboration-partner-wants-to-use-dropbox</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-is-the-best-way-to-enforce-zero-trust-in-external-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-replaces-mft-or-vdr-tools-for-day-to-day-collaboration-in-regulated-environments</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/what-solutions-integrate-secure-collaboration-directly-into-existing-enterprise-tools</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/which-platforms-prevent-oversharing-while-retaining-usability-in-regulated-enterprises</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/which-solutions-reduce-external-identity-and-sharing-risk-across-collaboration-platforms</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/why-email-attachments-are-putting-your-m365-security-at-risk-and-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/why-eshare</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/why-govern-cloud-file-storage-shadow-it</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/why-healthcare-needs-eshare-now-turn-authorized-sharing-into-governed-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/why-organizations-replace-box-with-eshare-for-microsoft-365</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/why-your-legacy-portals-are-holding-you-back</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/www-e-share-us-updated</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/www-e-share-us-updated-2</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/zero-trust-about-where-you-store-content</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/zero-trust-explained-how-it-works-why-your-business-needs-it</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/zero-trust-in-action-securing-link-sharing-in-microsoft-365</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/zero-trust-sharing</loc>
    </url>
    <url>
        <loc>https://eshare.com/posts/zones-of-risk</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/abac</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/ai</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/artificial-intelligence</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/attribute-based-access-control</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/case-study</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/cloud-computing</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/cloud-platforms</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/company</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/compliance</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/copilot</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/cybersecurity</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/data-centric-security</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/data-classification</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/data-governance</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/data-oversharing</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/data-sprawl</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/dex</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/digital-employee-experience</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/digital-workplace</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/dropbox</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/email</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/email-security</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/encryption</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/enterprise</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/file-sharing</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/file-transfer</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/genai</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/generative-ai</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/governance</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/hipaa</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/iam</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/information-security</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/m365</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/microsoft</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/microsoft-information-protection</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/microsoft-tenant</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/nist-800-171</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/o365</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/press-release</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/productivity</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/sdc</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/sdi</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/secure-data-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/secure-email</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/secure-file-sharing</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/security</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/trusted-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/vdr</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/virtual-data-room</loc>
    </url>
    <url>
        <loc>https://eshare.com/tags/zero-trust</loc>
    </url>
    <url>
        <loc>https://eshare.com/jobs/senior-backend-engineer</loc>
    </url>
    <url>
        <loc>https://eshare.com/jobs/senior-devops-sre</loc>
    </url>
    <url>
        <loc>https://eshare.com/categories/events</loc>
    </url>
    <url>
        <loc>https://eshare.com/categories/informative</loc>
    </url>
    <url>
        <loc>https://eshare.com/categories/news</loc>
    </url>
    <url>
        <loc>https://eshare.com/categories/podcast</loc>
    </url>
    <url>
        <loc>https://eshare.com/resources/collaboration-attack-surface-assessment</loc>
    </url>
    <url>
        <loc>https://eshare.com/resources/eshare-data-attributes-tool</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/celebrating-cybersecurity-leadership-at-the-2025-bostonciso-orbie-awards</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/e-share-joins-the-microsoft-intelligent-security-association</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/empowering-europes-digital-workplace-eshares-takeaways-from-gartner-uk-2025</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/empowering-the-digital-workplace-eshare-brings-trusted-collaboration-to-gartner-r-digital-workplace-summit-2025-in-grapevine-tx</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-and-axiomatics-announce-strategic-partnership</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-announces-continued-commitment-to-us-and-european-regulator-compliance-frameworks-for-fy-2025</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-announces-the-creation-of-an-elite-advisory-board-to-spearhead-holistic-data-governance-initiatives</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-appoints-harry-eliopoulos-as-managing-director-emea</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-appoints-niki-sotiropoulou-as-its-new-chief-marketing-officer2</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-is-a-proud-participant-in-the-microsoft-copilot-for-security-partner-ecosystem</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-makes-waves-at-gartner-summit</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-recognized-as-a-microsoft-security-excellence-awards-finalist-for-data-security-compliance-trailblazer</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-takes-the-spotlight-at-gartner-digital-workplace-summit-2024-in-london</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-welcomes-bill-hughto-as-its-strategic-account-executive</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-welcomes-john-paglierani-as-senior-vp-of-engineering</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-welcomes-mark-cassetta-as-chief-product-officer</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-welcomes-marko-antic-as-marketing-director-494e7</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-welcomes-matt-scheinman-as-director-of-revenue-operations</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-welcomes-owen-lipchitz-as-data-analytics-engineer</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/eshare-welcomes-tom-porter-as-new-principal-technical-advisor</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/sierra-space-achieves-perfect-cmmc-level-2-score-with-eshare-as-strategic-partner</loc>
    </url>
    <url>
        <loc>https://eshare.com/news-center/unlocking-trusted-collaboration-in-microsoft-365-highlights-from-eshare-at-m365-conference-2025</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/beyond-the-paradox-a-response-to-mckinseys-agentic-ai-advantage-for-the-m365-enterprise</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/building-an-ai-operating-model-that-scales-governing-high-velocity-innovation-without-the-bottlenecks</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/from-oversight-to-proof-building-trust-in-ai-through-traceability-and-governance</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/guest-accounts-the-shadow-it-problem-hiding-in-plain-sight</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/the-agent-oversharing-problem-why-we-need-to-get-governance-right-now</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/the-agentic-ai-readiness-gap-what-three-decades-in-life-sciences-taught-me-about-what-we-must-unlearn</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/the-ciso-imperative-hidden-in-gartners-2026-cio-priorities</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/the-compliance-clock-is-ticking-how-to-handle-cmmcs-y2k-moment</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/the-motion-paradox-what-if-the-data-never-moved</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/top-5-microsoft-365-governance-challenges-for-cios-and-cisos</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/unifying-identity-and-data-protection-for-unstructured-data-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/why-businesses-are-switching-from-box-to-microsoft-365-native-collaboration</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/why-fix-something-that-works</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/why-mft-and-vdrs-are-failing-the-digital-workplace</loc>
    </url>
    <url>
        <loc>https://eshare.com/library/why-your-ai-strategy-will-fail-without-information-governance</loc>
    </url>
    <url>
        <loc>https://eshare.com/whitepaper/history-of-cmmc-2-0</loc>
    </url>
    <url>
        <loc>https://eshare.com/whitepaper/positioning-external-data-risks</loc>
    </url>
</urlset>