<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//www.traxion.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://www.traxion.com/blog/</loc>
		<lastmod>2025-11-13T11:22:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/the-benefits-of-bizdevops-in-an-iam-process/</loc>
		<lastmod>2021-10-27T14:39:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_793940425-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/insider-risk-and-outsider-risk-features-and-actions-2/</loc>
		<lastmod>2021-10-27T15:14:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_1010217037-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/pam-and-iga-a-solid-duo-to-secure-your-data/</loc>
		<lastmod>2021-10-28T10:04:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/insider-risk-and-outsider-risk-features-and-actions-1/</loc>
		<lastmod>2021-10-28T11:26:17+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_691399240-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/the-right-change-management-is-crucial-in-every-iam-project/</loc>
		<lastmod>2021-10-28T13:43:16+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_745421890-2-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/all-systems-down/</loc>
		<lastmod>2021-10-28T14:27:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/responsible-for-your-perfect-monday-roca-and-krack/</loc>
		<lastmod>2021-10-28T14:36:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/blockchain-the-next-authentication-provider/</loc>
		<lastmod>2021-10-28T14:57:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/infosec-should-shield-the-business-from-big-data/</loc>
		<lastmod>2021-10-29T15:03:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2014/09/earth-shield.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/gecompromitteerde-beschikbaarheid/</loc>
		<lastmod>2022-05-04T09:18:15+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/03/shutterstock_1917586946-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/zonder-de-juiste-data-staat-de-r-van-rbac-voor-rubbish/</loc>
		<lastmod>2022-05-04T09:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/04/blog-rubbish.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/insider-risk-and-outsider-risk-features-and-actions-2/</loc>
		<lastmod>2022-05-04T09:34:41+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_1010217037-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/insider-risk-and-outsider-risk-features-and-actions-1/</loc>
		<lastmod>2022-05-04T09:35:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_691399240-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/digital-risk-protection-is-no-longer-a-nice-to-have/</loc>
		<lastmod>2022-05-09T12:52:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/compromised-availability/</loc>
		<lastmod>2022-05-24T15:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/03/shutterstock_1917586946-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/insider-risk-en-outsider-risk-kenmerken-en-acties-2/</loc>
		<lastmod>2022-05-31T07:27:43+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_1010217037-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/insider-risk-en-outsider-risk-kenmerken-en-acties-1/</loc>
		<lastmod>2022-05-31T07:29:50+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_691399240-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/de-voordelen-van-bizdevops-bij-een-iam-traject/</loc>
		<lastmod>2022-05-31T07:31:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_793940425-1-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/goed-change-management-is-cruciaal-bij-elk-iam-project/</loc>
		<lastmod>2022-05-31T07:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/shutterstock_745421890-2-610x319-1.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/pam-en-iga-een-solide-duo-om-je-data-te-beveiligen/</loc>
		<lastmod>2022-05-31T07:35:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/digital-risk-protection-is-no-longer-a-nice-to-have/</loc>
		<lastmod>2022-05-31T07:36:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/rubbish-in-rbac/</loc>
		<lastmod>2022-05-31T11:13:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/04/blog-rubbish.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/die-reise-in-die-cloud-und-wie-man-sie-sicher-antritt/</loc>
		<lastmod>2022-05-31T12:27:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/05/shutterstock_227542705-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/without-the-right-data-the-r-of-rbac-stands-for-rubbish/</loc>
		<lastmod>2022-05-31T12:33:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/04/blog-rubbish.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/kryptographie/</loc>
		<lastmod>2022-05-31T12:35:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/03/shutterstock_1917586946-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/the-journey-to-the-cloudand-how-to-make-it-safely/</loc>
		<lastmod>2022-10-25T14:45:52+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/05/shutterstock_227542705-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/op-weg-naar-de-cloud-en-hoe-u-daar-veilig-aankomt/</loc>
		<lastmod>2022-10-31T12:49:51+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/05/shutterstock_227542705-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/passwordless/</loc>
		<lastmod>2022-10-31T12:54:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/10/Shutterstock_1258102495-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/passwordless/</loc>
		<lastmod>2022-10-31T15:11:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/10/Shutterstock_1258102495-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/traxion-en-xm-cyber-kondigen-strategisch-partnership-aan/</loc>
		<lastmod>2022-11-24T14:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/11/XM-Cyber-Traxion-Partnership-4n3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/traxion-and-xm-cyber-announce-strategic-partnership/</loc>
		<lastmod>2022-11-24T14:44:49+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2022/11/XM-Cyber-Traxion-Partnership-4n3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/the-10-most-common-pitfalls-for-scim-2-0-compliant-api-implementations/</loc>
		<lastmod>2023-01-27T08:21:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/de-10-meest-voorkomende-pitfalls-bij-scim-2-0-compliant-api-implementaties/</loc>
		<lastmod>2023-01-27T08:21:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/privileged-access-op-basis-van-kortstondige-certificaten/</loc>
		<lastmod>2023-02-08T10:17:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2023/01/shutterstock_1620138052-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/privilegierter-zugang-auf-basis-ephemerer-zertifikate/</loc>
		<lastmod>2023-02-08T10:18:12+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2023/01/shutterstock_1620138052-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/privileged-access-based-on-ephemeral-certificates/</loc>
		<lastmod>2023-02-14T09:35:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2023/01/shutterstock_1620138052-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/keine-staendigen-privilegien-zero-standing-privileges-durch-kurzlebigen-zugang-ephemeral-access/</loc>
		<lastmod>2024-03-20T13:50:23+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/03/Brian-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/belangrijke-factoren-voor-identity-governance-voor-de-rest-van-2024/</loc>
		<lastmod>2024-06-19T07:55:20+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/06/shutterstock_2157575741.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/management-of-cyber-security-risk-in-industrial-iot-and-ot/</loc>
		<lastmod>2024-09-13T07:39:04+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/09/Industry-Manufacturing-IoT-IIot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/zero-standing-privileges-door-ephemeral-access/</loc>
		<lastmod>2024-10-22T13:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/03/Brian-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/zero-standing-privileges-due-to-ephemeral-access/</loc>
		<lastmod>2024-10-22T13:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/03/Brian-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/krijg-griep-op-de-cybersecurityrisico-van-industriele-iot-en-ot/</loc>
		<lastmod>2025-01-16T11:56:46+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/09/Industry-Manufacturing-IoT-IIot.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/nis2-risico-management-kunt-u-cyber-risicos-echt-beheersen/</loc>
		<lastmod>2025-01-29T03:30:28+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/09/NIS2-website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/partners-in-cybersecurity-microsoft/</loc>
		<lastmod>2025-07-04T13:53:54+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/Untitled-design-4-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/iso-27001-certification-without-delay/</loc>
		<lastmod>2025-07-04T13:57:14+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/Untitled-design-3-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/grip-op-cryptografie/</loc>
		<lastmod>2025-07-14T14:28:18+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/05/shutterstock_1887563953.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/partners-in-cybersecurity-omada/</loc>
		<lastmod>2025-07-30T14:12:01+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/Untitled-design-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/partners-in-cybersecurity-thales/</loc>
		<lastmod>2025-09-22T12:11:19+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2025/09/Junk-70.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/partners-in-cybersecurity-omada/</loc>
		<lastmod>2025-09-22T12:49:09+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/Untitled-design-1-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/partners-in-cybersecurity-microsoft/</loc>
		<lastmod>2025-09-22T12:50:34+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/Untitled-design-4-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/beware-of-ransomware-how-to-stop-ransomware-attacks/</loc>
		<lastmod>2025-09-22T12:53:00+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2021/10/Untitled-design-38.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/nis2-risk-management-are-cyber-risks-really-manageabl/</loc>
		<lastmod>2025-09-22T12:53:57+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/09/NIS2-website.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/identity-governance-drivers-to-watch-for-the-rest-of-2024/</loc>
		<lastmod>2025-09-22T12:54:42+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2024/06/shutterstock_2157575741.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/blog/partners-in-cybersecurity-keyfactor/</loc>
		<lastmod>2025-11-13T11:22:32+00:00</lastmod>
		<image:image>
			<image:loc>https://www.traxion.com/wp-content/uploads/2025/09/Junk-70.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://www.traxion.com/nl/blog/</loc>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
	<url>
		<loc>https://www.traxion.com/de/blog/</loc>
		<changefreq>daily</changefreq>
		<priority>1.0</priority>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->