<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.zygon.tech</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/security-program</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/blog</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/use-cases/identity-lifecycle-management</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/use-cases/detection-governance</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/role/it</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/technology/google-workspace</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/why/modern-identity-governance</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/customer-story</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/integrations</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/features/automation</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/features/collaboration</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/role/security</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/technology/ms-365</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/terms</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/privacy</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/vulnerability-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/use-cases/security-and-alerting</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/use-cases/access-reviews-compliance</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/fr/la-gouvernance-des-identites-comme-clef-de-voute-de-la-securite-des-applications</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/features/zygon-browser-extension-copilot</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/features/zygon-agentic-iga-close-any-account-on-any-app-programatically</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/why/how-zygon-complements-sailpoint</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/partner-program</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/search</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/why/whats-broken-with-access-requests</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/customer-stories/delpha-has-reinforced-its-saas-infrastructure-with-zygon</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/customer-stories/stoik-selected-zygon-to-get-control-over-their-saas-stack</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/4-slack-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/a-fairly-realistic-approach-to-estimate-the-real-cost-of-deprovisioning</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/challenges-in-saas-employee-onboarding-or-registration-fatigue</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/get-google-unmanaged-accounts-under-control-with-zygon</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/how-to-achieve-shadow-it-detection</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/iam-practitioners-common-struggles-with-identity-governance-solutions</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/identity-governance-as-a-keystone-for-the-security-of-applications</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/overcoming-the-challenges-of-legacy-identity-governance-and-administration-iga</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/revolutionizing-saas-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/risks-of-sso</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/saas-security-the-traditional-it-organization-is-half-broken-and-requires-a-new-paradigm</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/the-benefits-of-just-in-time-jit-access-over-standing-privileges</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/the-critical-role-of-identity-governance-in-achieving-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/the-human-factor-will-exert-strong-influence-on-security-teams-and-business-users-alike</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/the-upcoming-wave-ais-emergence-as-the-new-shadow-it</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/unveiling-shadow-it-understanding-the-risks-to-organizational-integrity</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/unveiling-the-future-of-saas-security-key-findings-from-more-than-100-interviews</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/what-are-non-human-identities-and-why-you-should-care</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/what-is-sspm-saas-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/what-you-need-to-know-about-saas-apps-using-oauth-authorization-via-google-workspace-and-microsoft-office-365</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/why-are-free-trial-saas-applications-considered-invisible-security-risks</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/why-do-you-need-to-secure-your-saas</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/wtf-is-sso</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/zygon-is-joining-memority</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/zygon-nominated-as-one-of-the-most-promising-cybersecurity-startups-in-europe</loc>
    </url>
    <url>
        <loc>https://www.zygon.tech/post/zygon-raises-3m-in-seed-funding-to-create-security-solutions-for-the-saas-era</loc>
    </url>
</urlset>