<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.majorkeytech.com</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partners</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/page-not-found</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/careers</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/events</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/client-success</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/microsoft-entra-id-partner</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/search</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/capabilities</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/microsoft-entra-verified-id</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/capabilities/customer-identity-access-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/capabilities/identity-governance-administration</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/capabilities/non-human-identity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/capabilities/privileged-access-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/capabilities/workforce-identity-access-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/services/iam-advisory-services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/services/iam-deployment-integration</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/services/iam-managed-operations</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/authid</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/beyondtrust</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/britive</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/carahsoft</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/cyberark</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/delinea</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/microsoft</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/netwrix</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/okta</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/omada-identity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/pathlock</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/ping-identity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/radiant-logic</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/readi</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/sailpoint</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/sap</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/saviynt</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/strata</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/strongdm</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/thales</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/partner/veza</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/a-modern-scalable-iga-solution-for-a-large-healthcare-network</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/application-governance-vendor-selection-and-implementation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/cloud-security-assessment-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/fastpath-delinea-seperation-of-duties-toolset-update</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/hospital-system-user-onboarding</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/implementing-saviynt-eic-large-apparel-retailer</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/improving-security-microsoft-365-security-services-large-community-college-system</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/migrating-adfs-microsoft-entra-id-zero-trust-cloud-first-future</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/migrating-healthcare-institutions-to-microsoft-entra-id-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/modernizing-global-heavy-equipment-manufacturer-identity-application-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/recovering-stalled-fastpath-implementation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/sailpoint-rescue-fortune-500-bank</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/saviynt-rescue-services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/streamlining-identity-access-management-post-acquisition</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/our-success-story/user-onboarding-hospital</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/credsafe</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/horizonid</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/identitylens</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/identityscout</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/idproof</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/nomadid</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/orchestratid</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/iam-products/skydock</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/adam-barngrover</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/alicia-gutschow</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/anshul-chaudhary</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/arun-kothanath</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/brandon-nolan</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/dan-ross</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/daniel-saylor</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/duane-graham</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/edgar-cantu</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/francisco-urena</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/grishma-pandya</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/james-yoder</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/jim-troyer</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/juli-arvis</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/matt-graves</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/michael-yario</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/mike-hines</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/nathan-mertz</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/patrick-mcgeehan</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/paul-luka</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/philip-martinez</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/team/sandra-leung</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/5-common-access-review-pitfalls-how-to-fix-them</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/5-signs-zero-trust-is-right-for-your-organizat</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/6-highlights-from-sailpoint-navigate-2025</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/7-benefits-of-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/accelerating-privileged-access-security-practical-steps-for-pam-automation-success</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/auditing-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/authentication-vs-authorization-ciam-tools</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/benefits-advantages-of-ciam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/best-ciem-solutions-for-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/biometric-authentication-iam-guide</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/business-case-for-lifecycle-workflows-microsoft-entra-id</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/choose-the-best-ciam-solution</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/choosing-right-iam-solution</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/ciam-implementation-and-integration-best-practices</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/ciam-security-and-customer-experience-balance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/ciam-top-business-use-cases</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/cloud-entitlement-discovery-and-inventory</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/cloud-infrastructure-entitlements-key-elements</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/components-of-identity-and-access-management-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/critical-sharepoint-on-prem-zero-day-vulnerability-urgent-steps-to-protect-your-systems-now</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/customer-identity-and-access-management-ciam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/customer-identity-and-access-management-ciam-an-in-depth-overview</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/cyberark-webinar-series-transforming-identity-security-through-intelligent-automation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/decentralized-identity-explained-practical-q-a-2026</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/differences-between-ciam-and-iam-solutions</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/digital-trust-reimagined-verifiable-credentials-face-check-help-stop-fraud</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/elevating-customer-experience-driving-business-growth-ciam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/enhancing-remote-workforce-security-how-idproof-is-transforming-identity-verification</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/evidence-based-identity-governance-streamlined-audits-healthcare</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/features-to-consider-when-evaluating-pam-vendor</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/five-common-identity-governance-administration-iga-challenges-how-managed-services-help-solve-them</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/from-deepfakes-to-fraudulent-employees-securing-remote-work</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/fundamental-elements-of-modern-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/have-you-solved-your-iam-problem</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/how-ciam-tools-collect-and-use-customer-data</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/how-iam-helps-mitigate-cyber-security-risks</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/iam-compliance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/iam-for-government</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/iam-implementation-step-by-step-guide</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/iam-in-ecommerce</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/iam-in-financial-services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/iam-in-healthcare</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/identity-assurance-made-simple-remote-hiring-third-party-access-and-call-center-protection</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/identity-is-the-new-perimeter-security-in-a-cloud-first-world</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/identity-modernization-foundation-ai-readiness-healthcare</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/identity-modernization-long-live-ai-readiness</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/identity-silos-complexity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/iga-change-management-guide-to-successful-engagements</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/impact-of-ai-machine-learning-on-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/importance-of-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/importance-of-role-based-access-control-in-ciem</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/improve-security-with-a-zero-trust-access-model</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/introduction-to-cloud-infrastructure-entitlement-management-ciem</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/introduction-to-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/key-components-features-successful-ciam-programs</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/key-components-of-privileged-access-solutions</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/key-takeaways-from-identiverse-2025</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/kpis-for-app-onboarding-what-to-measure-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/mastering-certificate-renewal-how-automation-bridges-pki-and-privileged-access</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/microsoft-entra-id-governance-whats-new-and-why-it-matters</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/modernizing-identity-governance-majorkey-horizonid-microsoft-entra-suite</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/modernizing-identity-governance-streamlining-access-for-a-secure-enterprise</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/navigating-ai-adoption-identity-security-considerations-for-microsoft-copilot</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/nomadid-majorkey-strata-icam-ddil-disconnected-identity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/nydfs-amendment-user-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/on-premises-privileged-access-management-pam-versus-pam-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/outcome-driven-iam-why-identity-programs-win-on-results-not-tools</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/preparing-for-2024-solar-eclipse-guide-to-implementing-nist-csf-2</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/preparing-for-ai-driven-identity-threats</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/provisioning-and-deprovisioning-in-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/redefining-efficiency-and-reliability-how-majorkey-managed-operations-empowers-identity-programs</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/rethinking-application-onboarding-a-value-based-approach-for-real-business-impact-2025-navigate-session-recap</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/role-of-ciem-in-cloud-compliance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/role-of-iam-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/role-of-iam-in-education</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/role-of-single-sign-on-sso-in-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/securing-modern-identities-how-microsoft-entra-id-governance-transforms-access-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/segregation-of-duties</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/segregation-of-duties-challenges-and-mitigation-strategies</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/segregation-of-duties-finance-and-accounting</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/segregation-of-duties-role-of-technology</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/selling-iam-to-the-business-speak-their-language-not-yours</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/the-cost-of-waiting-how-access-delays-erode-clinical-efficiency</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/the-evolution-of-iam-transforming-from-security-necessity-to-strategic-value-driver</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/transitioning-beyond-mim-revisited-part-1-current-mim-landscape</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/unlocking-operational-insight-how-identitylens-is-transforming-managed-services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/vpns-to-identity-driven-access-microsoft-entra-global-secure-access-advantage</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/what-is-federated-identity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/what-is-harbor-pilot-an-intro-to-sailpoints-new-iam-ai-agent</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/what-is-privileged-access-management-pam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/what-is-role-based-access-control-rbac</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/what-is-skydock-a-comprehensive-solution-for-cyberark-object-migration</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/what-is-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/what-we-learned-at-cyberark-impact-2025</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/why-iam-projects-fail-and-how-to-flip-the-script</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/zero-trust-explained</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/zero-trust-isnt-just-for-the-cloud-it-works-for-on-premises-too</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/blogs/zero-trust-security-and-iam-in-access-control</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/authid-and-majorkey-selected-by-global-retailer-to-deliver-high-assurance-identity-onboarding-and-privileged-access-protection</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/authid-and-majorkey-technologies-forge-strategic-alliance-to-deliver-high-assurance-identity-verification-for-microsoft-entra-customers</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/majorkey-accelerates-pure-play-information-security-strategy-with-acquisition-of-legion-star</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/majorkey-launches-idproof-identity-verification-solution-for-microsoft-entra-customers</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/majorkey-named-one-of-only-10-global-platinum-delivery-partners-by-saviynt</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/majorkey-technologies-acquires-oxford-computer-group</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/mike-hines-majorkey-chief-revenue-officer</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/news-and-insights-clango-merger</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/news-and-insights-pureplay-information-security-pivot</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/news-and-insights-sailpoint-msp-announcement</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/news/oxford-computer-group-majorkey-technologies-finalist-2025-microsoft-defense-and-intelligence-partner-of-the-year</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/2023-ciam-solutions-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/47-day-certificate-automation-readiness-checklist</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/a-modern-scalable-iga-solution-for-a-large-healthcare-network</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/ai-readiness-advisory-assessment</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/application-governance-vendor-selection-and-implementation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/authenticate-administer-authorize-and-audit-with-ping-identity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/automate-the-identity-lifecycle-with-microsoft-entra-id-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/automating-identity-governance-in-complex-environments</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/building-digital-trust-how-idproof-secures-remote-hiring-contractor-access-and-call-centers</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/cloud-security-assessment-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/configuring-and-using-custom-claims-in-microsoft-entra-id</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/consolidating-identity-processes-improving-security-and-reducing-costs-with-microsoft-entra-id-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/control-your-cloud-mastering-least-privilege-with-ciem</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/control-your-non-employee-identities-with-majorkey-and-sailpoint-nerm</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/creating-transformative-identity-governance-solutions-with-microsoft-entra-suite</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/credsafe-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/demystifying-modern-authentication</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/deploying-and-integrating-sailpoint-arm</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/discover-the-microsoft-entra-suite-unlocking-unified-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/ep-2-dynamic-cloud-pam-with-britive</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/exploring-microsofts-security-service-edge-sse-solution</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/fastpath-delinea-seperation-of-duties-toolset-update</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/fortifying-your-cyber-defenses-using-microsoft-defender-to-prevent-token-theft-and-aitm-attacks</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/from-sailpoint-identityiq-to-identity-security-cloud-creating-value-with-cloud</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/helping-community-colleges-improve-security-with-microsoft-365-security-services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/horizonid-overview</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/hospital-system-user-onboarding</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/how-misconfigured-hybrid-identity-setups-can-compromise-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/how-to-bolster-security-and-create-business-value-through-third-party-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/how-to-demonstrate-success-and-grow-the-roi-of-ciam-programs</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/how-to-get-the-most-out-of-your-microsoft-365-investments</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identity-advisory-services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identity-and-access-management-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identity-integration-and-consolidation-post-acquisition</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identity-that-works-for-healthcare</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identity-threat-detection-remediation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identitylens</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identitylens-overview-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/identityscout-overview</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/idproof-overview-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/introduction-to-microsofts-security-service-edge-for-identity-centric-network-access</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/legacy-to-legendary-reinvent-iam-horizonid-microsoft-entra</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/less-friction-more-flow-migrating-from-okta-to-microsoft-entra-id</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/leveraging-ai-in-identity-security-overview</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/life-after-mim-modernizing-identity-microsoft-entra-id-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/machine-identities-uncovering-the-hidden-risks-in-your-environment</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/majorkey-federal-capabilities-overview</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/majorkey-iga-services-overview</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/maximizing-value-showcasing-success-and-future-proofing-your-identity-program</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/methodology-for-a-successful-pam-program-with-cyberark</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/microsoft-copilot-ai-readiness-advisory-assessment</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/microsoft-entra-suite-workshop</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/microsoft-services-portfolio</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/migrating-from-adfs-to-azure-active-directory-benefits-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/migrating-from-mim-sync-user-provisioning-with-microsoft-entra-id</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/mim-microsoft-entra-readiness-roadmap-quickstart</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/modernize-your-privileged-access-management-program</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/modernizing-global-heavy-equipment-manufacturer-identity-application-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/moving-from-mim-to-microsoft-entra-id-governance-to-future-proof-identity-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/moving-mim-group-functionality-to-azure-ad-for-on-premises-group-attestation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/navigating-the-future-of-identity-2024-year-end-review-top-predictions-for-2025</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/nomadid-mission-ready-identity-management-federal-agencies-ddil</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/nomadid-overview-icam-for-federal-agencies-ddil-scenarios</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/non-user-starts-automation-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/optimize-your-saviynt-platform-with-majorkey-experts</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/orchestratid-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/pam-automation-playbook</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/pam-automation-playbook-identifying-quick-wins-and-strategic-gains</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/pki-meets-pam-automation-strategies-for-the-new-tls-certificate-lifespan</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/pki-meets-pam-navigating-shrinking-certificate-lifespans</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/powering-business-resilience-through-identity-security-and-service-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/recovering-a-cyberark-implementation-for-a-healthcare-fintech-leader</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/recovering-stalled-fastpath-implementation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/rust-to-resilience-active-directory-consolidation</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/sailpoint-iiq-to-isc-migration-programs</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/sailpoint-managed-services-provider-offers</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/sailpoint-rescue-fortune-500-bank</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/saviynt-rescue-services</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/saying-goodbye-adfs-migrating-a-federal-agency-to-microsoft-entra-id-for-a-zero-trust-cloud-first-future</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/sdlc-governance-with-blueflag-security</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/securing-academic-partnerships-overcoming-identity-challenges-in-collaborative-higher-education-environments</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/securing-the-unseen-governance-for-machine-identities</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/signs-your-iga-program-needs-a-reboot</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/skydock-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/streamlining-access-reviews-and-identity-governance-with-saviynt-eic-for-a-large-retailer</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/the-convergence-of-app-governance-and-identity-security</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/the-fundamentals-of-customer-identity-and-access-management-ciam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/the-great-convergence-bridging-the-gap-between-identity-and-app-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/the-next-evolution-of-identity-governance</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/the-rise-of-ai-threats-identity-management</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/transform-your-security-strategy-with-microsoft-sentinel-and-a-modern-managed-soc</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/transforming-identity-security-higher-education-microsoft-entra-suite-demonstration</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/transforming-privileged-access-management-with-cyberark</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/transitioning-from-the-mim-portal-to-microsoft-entra-id-mim-retirement-series-part-2</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/trust-verify-protect-strengthening-campus-identity-entra-verified-id-idproof</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/understanding-privileged-access-management-pam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/user-onboarding-hospital</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/using-microsoft-entra-verified-id-for-identity-proofing-of-partners-customers-and-employees</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/content-library/who-gives-a-sh-t-about-identity-security---how-to-create-business-value-from-iam</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/industry/federal</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/industry/healthcare</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/enterprise-asset-management/eam-best-practices</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/enterprise-asset-management/eam-case-studies</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/enterprise-asset-management/eam-software-solutions</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/enterprise-asset-management/enterprise-asset-management-101</loc>
    </url>
    <url>
        <loc>https://www.majorkeytech.com/enterprise-asset-management/future-of-asset-management</loc>
    </url>
</urlset>