<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://resources.unosecur.com/old-home-2</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/careers</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/imprint</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/term-conditions</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/white-paper</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/partners</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/partner/aws</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/events-webinar</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/news-announcement</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/use-cases/identity-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/use-cases/identity-security-posture-management</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/use-cases/identity-least-privileges-implementation</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/use-cases/identity-privilege-access-management</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/use-cases/identity-audit-and-compliance</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/use-cases-overview</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/partner/gcp</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/partner/azure</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/videos</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/legal/subprocessors</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/unosecur-roi-estimator</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/mcp-security-checklist</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/one-click-compliance-reporting</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/dev/client-first-style-guide</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/connectors</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/careers/back-end-developer</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/careers/product-manager---ai-prototyping-and-innovation</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/whitepaper/dora-cloud-and-identity</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/videos/smarter-ui-and-ai-bring-rapid-risk-insights-ui-product-update</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/event/congress-it-sa-2024</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/event/cxo-feast-celebration-2025</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/event/empowering-cxo-cyber-security-conference-award-ceremony</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/event/fwd-cloudsec-europe-2024</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/event/rsac-conference-2025</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-cloud-compliance-pulse-h1-2025-reveals-forty-identity-security-failures-in-the-average-cloud-tenant</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-expands-leadership-team-following-5m-seed-funding-to-drive-ai-powered-identity-security</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-integrates-iamanalyzer-with-prisma-cloud-for-risk-aware-identity-insights</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-joins-wiz-integrations-network-win</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-launches-native-github-integration-to-eliminate-identity-blind-spots</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-secures-5-million-in-seed-funding-to-fortify-identity-security-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-ships-native-slack-connector-giving-security-teams-instant-control-over-every-user-bot-and-token</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/announcement/unosecur-unveils-office-365-connector-to-eliminate-dormant-accounts-and-shadow-admins-strengthen-identity-security</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/access-certification</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/access-discovery</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/acme-protocol</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/active-directory</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/application-gateway</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/authentication-and-authorization</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/automated-certificate-management</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/bastion-account-bastion-konto</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/bot-security</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/break-glass-account-notfallkonto-break-glass-konto</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/customer-identity-and-access-management-ciam</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/directory-services</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/dora-act</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/emergency-access-notfallzugang</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/entitlement</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/high-risk-entitlement</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/identity-and-access-management-iam</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/identity-as-a-service-idaas</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/identity-governance-and-administration-iga</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/identity-lifecycle-management-ilm</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/identity-threat-detection-and-response-itdr</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/intelligent-privilege-controls</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/just-in-time-jit-access</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/kubernetes</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/least-privilege</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/machine-identity</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/malware-attacks</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/mitre-att-ck-framework</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/multi-cloud</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/multi-factor-authentication-fatigue</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/multi-factor-authentication-mfa</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/nist-sp-800-207-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/non-human-identity</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/operational-technology-ot-cybersecurity-cybersicherheit-der-betriebstechnologie-ot</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/pci-dss</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/peer-approval-peer-genehmigung</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/phishing</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/phishing-attack</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/privilege-rings-privilegierungsringe</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/privileged-access-management-pam</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/privileged-entitlements-management-pem</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/ransomware</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/remote-access-security</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/remote-work-security</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/robotic-process-automation-rpa</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/secops</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/secrets-management</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/single-sign-on-sso</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/soc-2</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/social-engineering</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/standing-privileges</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/tea-time-entitlements-and-approvals</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/temporary-elevated-access-management-team</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/third-party-access</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/user-behavior-analytics</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/virtual-directory</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/voice-phishing</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/workload-identity</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/zero-standing-privileges-zsp</loc>
    </url>
    <url>
        <loc>https://resources.unosecur.com/glossary/zero-trust</loc>
    </url>
</urlset>