<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://identity-insights.com/</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>daily</changefreq>
    <priority>1</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/topics/best-practices</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/topics/news-trends</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/topics/tools-solutions</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/topics/case-studies</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/topics/laws-compliance</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/resources/guides</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/resources/tools</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/resources/glossary</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.6</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/contact</loc>
    <lastmod>2026-04-03T23:50:56.355Z</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/understanding-the-role-of-ciem-in-securing-digital-identities</loc>
    <lastmod>2025-02-14T14:58:28.287Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/ai-powered-identity-threats-the-next-frontier-in-cybersecurity-warfare</loc>
    <lastmod>2025-02-08T14:45:34.070Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/mastering-azure-identity-and-access-management-a-guide-for-iam-consultants</loc>
    <lastmod>2025-02-08T00:30:30.484Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/azure-identity-and-access-management-iam-guide</loc>
    <lastmod>2025-02-08T00:24:00.953Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/replacing-identity-governance-and-administration-tools-navigating-the-rfi-and-rfp-process</loc>
    <lastmod>2025-01-29T19:58:28.534Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/navigating-identity-and-access-management-zero-trust-passwordless-ispm-itdr-and-more</loc>
    <lastmod>2025-01-27T16:06:11.573Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/itdr-and-iam-integration</loc>
    <lastmod>2025-01-24T20:55:01.209Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/machine-identities-securing-the-invisible-workforce</loc>
    <lastmod>2025-01-23T22:40:06.407Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/understanding-identity-and-access-management</loc>
    <lastmod>2025-01-22T19:13:29.206Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/understanding-zero-trust-architecture</loc>
    <lastmod>2025-01-22T18:43:29.025Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/leveraging-ai-in-identity-security</loc>
    <lastmod>2025-01-20T22:14:15.209Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/saviynt-esc-vs-sailpoint-isc-part-1-2</loc>
    <lastmod>2025-01-20T20:34:34.480Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/saviynt-esc-vs-sailpoint-isc-part-2-2</loc>
    <lastmod>2025-01-20T17:07:18.233Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/understanding-identity-fabric-a-comprehensive-guide</loc>
    <lastmod>2025-01-17T14:39:06.459Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/understanding-identity-protection-a-comprehensive-guide</loc>
    <lastmod>2025-01-17T14:38:48.763Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://identity-insights.com/article/understanding-single-sign-on</loc>
    <lastmod>2025-01-17T14:38:18.722Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
  </url>
</urlset>