<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.leen.dev</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/product</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/blog</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/changelog</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/about</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/demo</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/beyond-the-noise</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/case-studies-drata</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/security-by-numbers</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/8-benefits-of-unified-api-integration</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/ai-in-security-panel-five-takeaways</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/announcing-leens-new-user-portal-streamlining-your-security-integration-management</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/api-integration-examples</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/benefits-of-implementing-a-security-data-fabric</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/building-integrations-the-fundamental-starting-point-for-engineering-teams</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/challenges-of-traditional-security-data-architectures</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/compliance-cost-reduction</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/cyber-insurance-analytics</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/cyber-insurance-checklist</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/cyberbytes-making-hard-pivots-and-building-the-modern-security-data-fabric</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/data-normalization-for-security-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/how-a-unified-api-transforms-soc-2-compliance-streamlining-evidence-collection-and-control-mapping</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/how-ctem-platforms-use-leen-to-build-and-scale-integrations</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/how-grc-platforms-are-leveraging-leens-unified-api-for-security-data</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/how-leen-powers-cyber-insurance-underwriting</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/how-we-improved-our-testing-pipeline</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-andreas-haugsnes-ex-chief-security-architect-at-unity-technologies</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-anshuman-bhartiya-staff-security-engineer-lyft</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-ashwin-ramesh-detection-response-security-engineer-e4-at-plaid</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-emma-jin-engineering-manager-semgrep</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-hardik-thakkar</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-jon-ticknor</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-justin-pagano-director-security-risk-trust-klaviyo</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-linda-fry-head-of-enterprise-resilience-technology-risk-netflix</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-max-louthian-arcadia</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-mike-norries-director-of-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-nathan-koester-staff-security-engineer-at-ironclad</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-nitasha-syed-lead-product-manager-vanta</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-prashanthi-koutha-senior-risk-engineer-at-netflix</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-rohan-tandon-engineering-manager-at-panther</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-saloni-porwal-senior-product-manager-at-drata</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-sundar-vincent-ex-sr-principal-architect---iam-at-jp-morgan-chase</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-varun-prusty-staff-security-engineer-asana</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-veer-singh-staff-security-engineer-infoblox</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-security-with-victor-baddour-head-of-forward-deployed-engineering-at-symmetry-systems</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/inside-the-buyers-mind-how-security-leaders-evaluate-procure-tools</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/integrations-build-vs-buy</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introducing-inside-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introducing-leen-cloud-security-posture-management-cspm-connector-library</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introducing-leen-end-point-detection-edr-connector-library</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introducing-leen-vulnerability-management-connector-library</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introducing-leens-v2-api-for-vulnerability-data</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introducing-onramp-simplifying-connector-onboarding-for-users</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introduction-to-security-data-fabrics</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/introduction-to-unified-apis-for-security-data-what-why-and-how</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/leen-funding-annoucement</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/leen-is-soc-2-type-2-compliant</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/leen-origins</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/leen-partners-with-qualys-for-enhanced-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/leen-partners-with-tenable-for-enhanced-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/leen-press-kit</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/leveraging-ocsf-for-enhanced-mdr</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/our-experience-building-the-synk-integration</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/security-data-fabric-enabling-scalability-and-flexibility</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/security-integration-for-grc-automation</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/the-critical-role-of-integrations-in-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/the-importance-of-security-engineering</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/the-need-for-unified-apis-in-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/the-real-cost-of-integration-development-in-house-vs-leen</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/the-value-of-a-common-ontology-in-cybersecurity-detection-response-and-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/top-5-challenges-of-security-integrations-and-how-unified-apis-solve-them</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/tracking-vulnerability-state-over-time</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/understanding-security-connectors-benefits-examples-and-how-they-work</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/unified-api-vs-ipaas</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/what-are-the-benefits-of-security-integration</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/what-is-api-integration</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/why-continuous-security-data-collection-is-challenging-for-grc-and-auditors</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/post/why-we-named-our-company-leen</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/abnormal-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/aikido</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/apiiro-terraform</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/aqua</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/archer</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/armis</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/arnica</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/aws-iam-access-analyzer</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/aws-inspector</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/aws-redshift</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/aws-s3</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/aws-security-hub</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/barracuda</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/bitsight</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/black-kite</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/bugcrowd</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/cartography</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/check-point</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/checkmarx</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/cisco-secure-firewall</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/connectsecure-cybercns</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/contrast-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/cribl</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/crowdstrike-edr</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/crowdstrike-falcon-spotlight</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/cyera</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/databricks</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/datadog</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/duo-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/elastic</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/exabeam</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/f5-networks</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/firebase</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/flashpoint</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/fortinet</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/gitguardian</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/github-advanced-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/github-dependabot</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/gitlab-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/google-bigquery</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/google-cloud-storage</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/grype</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/hackerone</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/huntress</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ibm-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ivanti</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/jamf</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/jira</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/jumpcloud</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/jupiterone</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/kandji</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/lacework</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/logrhythm</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/lookout</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/material-security</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/mend</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/mimecast</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/monday-com</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ms-azure</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ms-defender-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ms-defender-for-endpoint</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ms-defender-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ms-entra-id</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/ms-teams</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/netskope</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/okta</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/onetrust</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/opentext</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/orca</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/pagerduty</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/palo-alto-prisma-cloud</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/panther</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/portswigger</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/project-discovery</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/proofpoint</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/qualys-edr</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/qualys-vm</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/rapid7-insightvm</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/recorded-future</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/securityscorecard</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/semgrep</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/sentinelone</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/sentinelone-vm</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/servicenow-cmdb</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/servicenow-grc</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/servicenow-itsm-lb5sd</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/servicenow-tprm</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/servicenow-vulnerability-response</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/slack</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/snowflake</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/snyk</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/socket</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/sonarqube</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/sophos</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/sumo-logic</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/sysdig</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/tanium</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/tenable-nessus</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/tenable-vulnerability-management</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/tines</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/torq</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/upguard</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/upwind</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/veracode</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/virustotal</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/vmware-carbon-black</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/integrations/zscaler</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/use-cases/ai-soc-automation</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/use-cases/automated-grc</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/use-cases/cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/use-cases/reporting</loc>
    </url>
    <url>
        <loc>https://www.leen.dev/use-cases/vulnerability-management</loc>
    </url>
</urlset>