<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.axiad.com</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-conductor</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-mesh</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/solutions/block-phishing-attacks</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/solutions/mitigate-identity-risks</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/solutions/modernize-pki</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/solutions/identity-hygiene-needs-automation</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/solutions/implement-fido</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/solutions/manage-hardware-authenticators-at-scale</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/industries/financial-services</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/industries/energy-and-utilities</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/industries/healthcare-insurance</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/industries/insurance</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/industries/federal-agencies-and-contractors</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/resources-center</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/resources</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/partner-program</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/support</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/website-terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/mobile-terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/careers</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/support/report-security-incident</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/support/submit-a-support-ticket</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/request-a-demo</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-software-subscription-agreement</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-cloud-terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/software-subscription-agreement</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-eula</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-cloud-reseller-agreement</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-technical-support</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-cloud-sla</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/become-a-partner</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/register-a-deal</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-foundation</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/axiad-confirm</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/customer-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/ivip</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events/achieving-us-government-mandates-with-operational-efficiency</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events/axiad-at-rsac</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events/federal-icam-101-modernize-and-simplify-credential-management-and-pki-with-cloud</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events/federal-identity-forum-expo</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events/fs-isac-2026-americas-spring-summit</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events/gartner-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/webinars-events/guidepoint-security-summit</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/70-of-security-it-professionals-say-they-are-overwhelmed-by-the-complexity-of-their-authentication-systems</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-achieves-fedramp-ato-to-secure-identities-at-the-speed-of-now</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-achieves-fedramp-ready-certification-status</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-airlock-accelerates-path-to-passwordless</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-and-carmax-to-co-present-at-gartner-identity-access-management-summit-on-passwordless-orchestration</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-and-esg-survey-82-of-respondents-indicate-passwordless-authentication-is-a-top-five-priority</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-and-venafi-partner-to-provide-passwordless-access-for-users-and-machines</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-announces-a-federal-agency-selects-axiad-cloud-to-protect-user-identities-and-fight-phishing</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-announces-integration-with-microsoft-entra-id-fido2-provisioning-api</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-announces-membership-in-microsoft-intelligent-security-association</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-announces-strategic-partnership-with-guidepoint-security</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-announces-support-for-microsoft-azure-active-directory-certificate-based-authentication-cba</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-appointed-to-fido-alliance-board</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-appoints-cybersecurity-veteran-david-canellos-as-new-ceo</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-appoints-new-chief-financial-officer-and-vice-president-of-sales</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-at-identiverse-and-gartner-sec-2024</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-expands-international-footprint-with-canadian-hosting-capabilities</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-holdings-raises-20-million-from-invictus-growth-partners-to-accelerate-the-future-of-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-id-cloud-now-certified-safe-biopharma-compliant</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-ids-announces-axiad-mycircle</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-joins-the-aws-partner-network</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-kicks-off-2023-with-cybersecured-and-tmc-cybersecurity-excellence-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-launches-india-development-center-to-expand-global-r-d-capabilities</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-launches-passwordless-authentication-for-government-critical-infrastructure-and-defense-industrial-base</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-moves-headquarters-to-san-jose-california</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-named-2026-cyber-top-companies-award-winner</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-named-a-two-time-winner-of-the-11th-annual-global-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-named-to-esteemed-cyber-66-list-of-the-hottest-privately-held-cybersecurity-companies</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-names-accenture-customer-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-names-new-chief-product-officer-and-vice-president-of-systems-engineering</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-partners-with-ping-identity-to-enhance-cybersecurity-posture-with-certificate-based-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-ping-integration</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-presents-a-new-approach-to-enterprise-wide-passwordless-authentication-at-infosec-world-conference</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-presents-the-devil-is-in-the-details-not-all-passwordless-strategies-are-equal-at-gartner-identity-access-management-summit</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-raises-25m-in-private-equity-round-from-invictus-growth-partners</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-recognized-in-the-2023-gartner-market-guide-for-user-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-sweeps-five-gold-2023-cybersecurity-excellence-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-to-present-at-identity-management-day-on-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-unveils-axiad-mesh-to-resolve-identity-risk-at-enterprise-scale</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-unveils-global-trusted-partner-program-to-accelerate-enterprise-and-federal-identity-security-adoption</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-webinar-analyzes-the-applications-and-benefits-of-certificate-based-authentication-as-part-of-a-modern-authentication-and-cybersecurity-program</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-welcomes-jay-carpenter-as-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-wins-a-2023-fortress-cybersecurity-award-for-authentication-and-identity</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-wins-cybersecurity-excellence-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-wins-fortress-award</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-wins-gold-stevie-in-2023-international-business-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiad-wins-infosec-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/axiads-certificate-based-authentication-for-iam-now-available-in-aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/cybersecurity-veteran-david-kennedy-joins-axiads-board-of-directors</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/fido-alliance</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/identitymanagementday2021</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/invictus-growth-places-initial-bet-on-cybersecurity-firm-axiad</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/modernizing-federal-pki-from-legacy-liability-to-strategic-asset</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/now-available-on-carahsofts-gsa-schedule-contract</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/peel-police-the-third-largest-police-force-in-canada-discusses-solving-their-authentication-challenges-with-axiad-cloud-in-december-8-webinar</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/q-a-identity-risk-prevention-with-axiad-ceo-david-canellos</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/rsac-session-highlights-importance-of-pqc-readiness</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/survey-reveals-more-than-half-of-organizations-fell-victim-to-password-cyber-attack</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/top-10-iam-solution-providers</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/what-federal-agencies-must-get-right-to-deploy-derived-piv-at-scale</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/whfb-announcement</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/newsroom/why-nows-the-time-to-prepare-for-the-quantum-computing-era</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/10-best-practices-for-microsoft-azure-ad-security-an-in-depth-guide</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/10-tips-for-hybrid-and-remote-work-security</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/2022-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/2023-top-breaches-building-the-case-for-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/2024-world-password-day-and-the-security-challenge-of-passwords</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/2fa-vs-mfa-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/3-key-use-cases-for-certificate-based-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/5-current-challenges-of-identity-governance-and-administration</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/5-tips-for-selecting-a-cloud-authentication-solution</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/5-tips-to-take-control-of-your-home-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/5-ways-companies-benefit-from-cloud-based-identity-and-access-management-solutions</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/7-key-requirements-for-deploying-derived-piv-for-us-federal-agencies</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/7-reasons-why-phishing-resistant-mfa-should-be-your-goal</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/9-critical-items-to-have-on-your-cmmc-compliance-checklist</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/a-review-of-2024s-biggest-data-breaches-will-we-ever-learn</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/achieving-cmmc-readiness-with-smart-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/achieving-cohesive-identity-security-for-an-entire-organization</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/air-gapped-environments-need-strong-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/are-your-public-facing-domains-quantum-ready</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/attackers-dont-hack--they-impersonate</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-and-okta-partner-to-revolutionize-authentication-with-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-concludes-landmark-year-with-a-world-first-identity-risk-management-solution</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-conductor-named-a-finalist-in-the-prestigious-sc-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-expands-support-for-fido2-and-azure-ad-credentials</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-honored-with-a-coveted-stevie-in-2023-american-business-awards</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-mesh-the-first-identity-visibility-and-intelligence-platform</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-takes-a-leading-role-in-microsofts-fido-provisioning-api-upgrade</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/axiad-wins-a-peerspot-rising-star-award-the-latest-recognition-in-a-milestone-year</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/best-practices-for-streamlining-credential-management</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/cba-and-fido-one-other-or-both</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/cba-vs-mfa-which-to-use-and-when</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/celebrating-international-women-in-cyber-day-an-interview-with-axiads-karen-larson</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/celebrating-what-we-hope-is-the-end-to-world-password-day</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/certificate-based-authentication-esg-interview</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/choice-2025-tortoise-hare-or-bear-food</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/cisa-zero-trust-maturity-model-takeaways-from-the-white-house-omb-memo</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/clarifying-identity-risk-axiad-mesh-microsoft-edge-for-business</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/correlating-identities-and-their-users</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/do-passwords-impact-productivity-they-do-60-of-us-workers-we-surveyed-said-they-stop-them-from-doing-their-jobs</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/do-you-need-a-zero-trust-saas</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/dont-let-underlying-it-complexity-block-your-road-to-successful-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/enough-is-enough-4-reasons-to-eliminate-passwords-this-year</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/experts-say-quantum-will-break-todays-encryption-by-2029</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/fair-how-to-quantify-your-identity-risk-in-business-terms</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/features-of-identity-and-access-management-system</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/federal-icam-requirements-2026-beyond</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/federated-authentication-vs-sso</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/fido-alliance-takes-aim-at-two-new-cybersecurity-challenges-why-should-your-enterprise-care</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/fido-series-part-1-what-is-fido-passkey-and-why-is-it-important</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/fido-series-part-2-fido-passkeys-simplified</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/financial-institutions-navigating-regulations</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/forget-your-password-on-world-password-day</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/fresh-take-a-brief-reflection-on-the-national-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/fresh-take-our-five-key-takeaways-from-the-2023-gartner-identity-access-management-summit-in-texas</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/generative-ai-is-making-phishing-attacks-more-sophisticated-but-you-can-remove-the-bait-with-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/guide-to-fido-and-fido-2-passwordless</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/hardware-and-software-tokens-an-identity-love-story</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/help-for-a-lost-yubikey</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-does-azure-ad-certificate-based-authentication-work</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-does-certificate-based-authentication-work</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-government-agencies-can-cut-pkicosts-by-60</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-hackers-are-bypassing-mfa</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-standards-play-a-role-in-phishing-resistant-authentication-a-qa-with-tim-cappalli</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-to-adopt-unphishable-mfa</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-to-implement-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-to-implement-zero-trust-in-your-business</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/how-to-overcome-the-main-three-mfa-challenges-identified-by-nsa-and-cisa</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/iam-is-dead-long-live-icam</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/identity-gaps-the-need-to-use-both-x-509-fido</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/identity-is-the-key-to-saas-security-and-you-need-a-better-lock</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/identity-security-problems</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/identitymanagementday</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/industry-analysts-validate-axiad-mesh-vision-with-identity-visibility-and-intelligence-platform-ivip</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/is-passwordless-authentication-safe</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/is-your-mfa-broken</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/is-your-passwordless-solution-truly-password-less</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/itdr-vs-ispm-which-identity-first-product-should-you-explore</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/jerome-becquart-axiad-current-approaches-to-authentication-are-failing-employees</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/key-take-aways-from-the-nist-commentary-on-phishing-resistance</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/kuppingercole-highlights-axiad-as-a-top-passwordless-authentication-provider-1</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/lastpass-hacked</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/lessons-learned-from-the-cisco-data-breach</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/manage-all-of-your-credentials-from-a-single-platform</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/meet-airlock-a-solution-for-seamless-mfa-implementation</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/mfa-fatigue-attack</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/mfa-russian-dolls-understand-cmmc-compliance-and-authentication-requirements-of-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/mitigate-your-cyber-security-risks</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/moving-to-mobile-credentials-read-this-first</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/moving-to-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/moving-to-passwordless-authentication-part-2</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/multi-factor-authentication-examples</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/multi-factor-authentication-mfa-implementation-tips</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/navigate-path-to-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/navigating-the-path-to-enhanced-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/new-cjis-security-policy-changes-the-game-for-mfa-for-criminal-justice-organizations</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/oneclickissuance</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/operational-benefits-of-streamlining-authentication-management</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/organization-wide-passwordless-orchestration-podcast</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/partner-spotlight-streamlining-authentication-at-scale-with-idemia</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/partner-spotlight-the-power-of-axiad-and-yubico</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/password-day-insights</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/passwordless-authentication-in-air-gapped-networks-a-qa-with-alejandro-lopresti-idemia</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/passwordless-made-easy</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/phishing-resistant-authentication-for-everyone</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/ping-partnership</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/pipeline-attack</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/pki-and-fido2</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/qa-with-axiads-new-cfo-brian-szeto</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/qa-with-axiads-new-chief-product-officer-alex-au-yeung</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/real-world-results-the-impact-of-passwordless-authentication-on-the-credential-management-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/remote-access</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/remote-work-report</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/rethinking-enterprise-authentication-a-practitioner-point-of-view</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/rise-of-remote-7s64k</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/say-goodbye-to-passwords-for-good-your-employees-will-thank-you</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/six-best-practices-for-a-pragmatic-approach-to-phishing-resistance</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/state-sponsored-cyber-threats-are-escalating--is-your-identity-infrastructure-ready</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/stop-focusing-on-just-phishing</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/the-arrival-of-big-mo-at-axiad</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/the-evolving-world-of-cybersecurity-and-authentication-a-qa-with-david-kennedy</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/the-importance-of-phishing-resistant-mfa</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/the-major-cybersecurity-themes-of-2020</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/the-next-big-thing-in-identity-security-identity-fabrics</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/the-path-to-passwordless-phishing-resistant-mfa-is-emerging</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/the-why-and-what-of-cba-pki-based-certificates</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/three-authentication-predictions-for-2024</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/three-key-takeaways-from-the-2024-rsa-conference</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/three-things-to-look-for-in-a-security-partner-to-achieve-cmmc</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/todays-good-enough-mfa-should-be-phishing-resistant</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/top-attack-frontier-is-people</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/twitter-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/understanding-the-executive-order-on-improving-the-nations-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/vendor-consolidation</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/virtual-private-cloud-blog</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/virtuous-cycle-id-verification-and-the-credential-management-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/what-are-the-disadvantages-of-zero-trust-and-how-to-overcome-them</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/what-does-true-passwordless-security-mean</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/what-if-i-lose-my-yubikey-or-google-authenticator</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/what-is-an-identity-visibility-and-intelligence-platform-ivip</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/what-is-fido2-authentication-and-how-does-it-work</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/what-is-passwordless-authentication-and-how-does-it-work</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/whats-all-the-hype-about-frictionless</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/when-ai-becomes-the-hacker-identity-is-your-last-line-of-defense-mythos</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/whfb</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-accenture-is-axiads-2025-customer-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-critical-infrastructure-environments-need-passwordless-authentication</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-fedramp-ready-certification-status-is-a-big-deal</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-google-passkey-is-good-for-b2b-adoption-of-emerging-authentication-practices</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-hosting-by-country-makes-sense</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-is-automating-2-factor-authentication-important</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-is-certificate-based-authentication-hot-right-now</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-phishing-resistant-mfa-is-critical-in-2023-and-how-cba-can-help</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-public-key-infrastructure-pki-as-a-service-makes-sense</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/why-the-best-passwordless-authentication-solution-must-be-a-unified-one</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/work-from-anywhere-with-security-and-trust</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/xfinity-data-breach</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/zero-trust-and-microsegmentation-an-explainer</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/zero-trust-misconceptions</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/blog/zero-trust-vs-defense-in-depth-whats-the-difference</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/landing/essential-guide-to-identity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/landing/get-expert-insight-on-ivip-to-reduce-your-identity-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/landing/see-your-identity-risk-in-minutes</loc>
    </url>
    <url>
        <loc>https://www.axiad.com/landing/see-your-identity-risk-in-minutes-2</loc>
    </url>
</urlset>