<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://midtechsecurity.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2023-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/44f8f8c4-f713-45bf-8051-47d6f1fb3cad/GSD+Background.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1626824768037-TYPWZUDRO8QBIVSBSGQE/Security%2BDome%2BCamera.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1626972953051-8VMBF43LU17XK2T4FAZ8/Intruder+Alert.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1626824746532-2ZQY6LHH71IWXC89A0TC/access+control.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/524ae21e-1377-4070-b929-84ee8dd199c2/Eagl+Logo.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1627057714536-W4FE0TLUG8YFQHNY3RKD/Mid+Tech+partnerships+working+copy+2.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://midtechsecurity.com/access-control</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1627330073294-04V3BGD925HBUDVXNPXW/Access+Control+Josh.jpg</image:loc>
      <image:title>Access Control - Access Control</image:title>
      <image:caption>Mid Tech offers customized access control solutions that allow for efficient management of access for one or multiple buildings with an easy-to-navigate interface. Mid Tech partners with only the best in the access control industry. As a result, Mid Tech can provide clients real-time monitoring and control of access points throughout the entire organization via the cloud, or through an on-premise package. Our access control solutions integrate with a wide range of video management systems enabling a single, powerful interface for unified control and communications.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1627331642428-49B3BKQTJIK8K3YSC3CA/Turnstile.jpg</image:loc>
      <image:title>Access Control - Perimeter Protection</image:title>
      <image:caption>Turnstiles Barrier Entry Systems Gates Revolving Doors Fence Detection Metal Detection Access control is more than keys and locks. Our software engineers, design engineers, and service-support staff stay up-to-date on the latest technology, so we can seamlessly integrate that knowledge into your business.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1628194136957-R8E24T3VZWGYZX6QKSDF/Phone+AC3.png</image:loc>
      <image:title>Access Control - Locks &amp; Keys are things of the past</image:title>
      <image:caption>However you want to control access, you can. Analog code locks Key FOB Mobile phone apps Video integrated control The options are limitless, and all of them are safer and more secure than traditional lock and key hardware.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://midtechsecurity.com/alarm-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1627653861610-3P7UUD1JGJJJGEDNVVEN/GettyImages-653501308.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1628103212507-E48GVIZM3L1HKV24DGFL/Home-security-alarm-1.jpeg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1628192739163-BIX5HRGZ7UPO0UU86SVE/unsplash-image-3fPXt37X6UQ.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://midtechsecurity.com/video-surveillance-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1627651445578-V2VWCVXUO6R5TKG86QN1/Screen%2BShot%2B2021-07-29%2Bat%2B1.06.40%2BPM.jpg</image:loc>
      <image:title>Video Surveillance - Security Cameras</image:title>
      <image:caption>•Camera layout designed specifically for your interior/exterior coverage needs •IP cameras from leading manufacturers •License plate recognition •Cloud integrated cameras Our team has over 100 years of experience in designing and implementing video surveillance systems. Our solutions are sized to fit any environment and are designed to integrate into your existing IT system.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1627325646805-RN9165UD8VV9VNNRFB84/Surveillance+Wall.jpeg</image:loc>
      <image:title>Video Surveillance</image:title>
      <image:caption>Video Surveillance</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1627329334755-IJEB8H4HJTNKB4I4CCWI/Video-Management-Systems-Bigger-Budget-Security-Magazine.jpeg</image:loc>
      <image:title>Video Surveillance - Video Management Systems (VMS)</image:title>
      <image:caption>Recording, storage, and preservation of video is accomplished through the use of video management systems (VMS). The VMS is sized to fit the system application. The number of cameras, the amount of activity the cameras will record and the length of video retention all affect the choice of the VMS. Modern VMS solutions allow for on premise, hybrid, or cloud video management, and each have their own use cases.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://midtechsecurity.com/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/1634567559103-2429FE296UCC1KSIN0SH/MidTech+FINAL+smaller.png</image:loc>
      <image:title>Contact Us - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://midtechsecurity.com/gunshot-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-03</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/ec860df2-b678-4288-b7f0-76f45695366e/FireFly.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/a4ff7571-61e1-4323-b471-869fbb11f03b/Panic+Button.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/2d2fd90c-e3fe-46f1-9430-fd9001215a1b/Seal_of_the_United_States_Department_of_Energy.svg.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/345b5753-61de-49c9-ba8d-18bd1bbb4c64/Screenshot+2023-10-02+at+1.31.14+PM.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/71980eb5-180e-4f4e-9c12-0684665e0c08/Firefly.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://midtechsecurity.com/project-protect</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1618497259178-6XJGK9GR6YAVBQL5L519/20140301_Trade-151_012-2.jpg</image:loc>
      <image:title>Project Protect</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5ec321c2af33de48734cc929/1607694583486-2PQT0LQ193RL7MCB6DX4/20140228_Trade+151_0046.jpg</image:loc>
      <image:title>Project Protect</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/60ed9d206ad34d2ddacafc71/06a672fd-a99a-461b-b1f1-7b59308a0274/Project+Protect+Logo+2.png</image:loc>
      <image:title>Project Protect</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://midtechsecurity.com/terms-and-conditions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-01</lastmod>
  </url>
</urlset>

