<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//optimalidm.com/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://optimalidm.com/resources/news/</loc>
		<lastmod>2026-03-08T17:53:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/online-records-exposed-brilliance-security/</loc>
		<lastmod>2019-10-01T14:29:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/interview-last-watchdog/</loc>
		<lastmod>2019-10-01T14:32:04+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/07/last-watchdog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/manufacturers-need-industrial-quality-access-control/</loc>
		<lastmod>2019-10-01T14:32:20+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/05/identity-access-management-manufacturing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/know-your-credentials/</loc>
		<lastmod>2019-10-01T14:33:58+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/05/finance-21.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/podcast-the-charles-tendell-show/</loc>
		<lastmod>2019-10-01T14:34:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cyber-defense-magazine/</loc>
		<lastmod>2019-10-01T14:34:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/privileged-access-management-101/</loc>
		<lastmod>2019-10-01T14:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/03/pam-storm-trooper.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/8-hot-cyber-security-trends-4-going-cold/</loc>
		<lastmod>2019-10-01T14:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/old-logins-white-hot-dark-market/</loc>
		<lastmod>2019-10-01T14:43:21+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/02/old-passwords.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/internal-hiring-vs-hiring/</loc>
		<lastmod>2019-10-01T14:44:48+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/12/business-partners-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/gdpr-compliance/</loc>
		<lastmod>2019-10-01T14:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/10/GDPR-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cybersecurity-breakthrough-award/</loc>
		<lastmod>2019-10-01T14:49:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-names-chris-curcio-vice-president-channel-sales-division/</loc>
		<lastmod>2019-10-01T14:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-positioned-niche-players-quadrant/</loc>
		<lastmod>2019-10-01T14:50:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-tools-cut-costs-data-breach/</loc>
		<lastmod>2019-10-01T14:50:59+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/06/saw-through-data_iStock-600075912.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-aaas-offering/</loc>
		<lastmod>2019-10-01T14:51:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/101-uses-virtual-directory/</loc>
		<lastmod>2019-10-01T14:51:33+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/04/101-uses-cover.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-offers-stand-alone-mfa/</loc>
		<lastmod>2019-10-01T14:52:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-you-need-totp/</loc>
		<lastmod>2019-10-01T14:57:13+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2016/01/TOTP-App3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/that-synching-feeling-i-get-from-cloud-sso/</loc>
		<lastmod>2019-10-01T14:57:42+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/12/sinking-feeling-definiton.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/microsoft-ignite-conference/</loc>
		<lastmod>2019-10-01T14:58:55+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/banner-resources.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-interoperability-microsoft-office-365/</loc>
		<lastmod>2019-10-01T16:16:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-virtual-identity-server-office-365-enhancing-extending-office-365s/</loc>
		<lastmod>2019-10-01T16:16:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-signs-gold-sponsor-experts-conference-tec-2012-hosts-user-conference/</loc>
		<lastmod>2019-10-01T16:16:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-addition-jeffrey-bohren-optimal-idm/</loc>
		<lastmod>2019-10-01T16:16:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-federation-product-integrates-microsofts-active-directory-federation-services-adfs-20/</loc>
		<lastmod>2019-10-01T16:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-gold-sponsor-experts-conference-2011-tec-2011/</loc>
		<lastmod>2019-10-01T16:16:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-optimal-people-picker-sharepoint-2010/</loc>
		<lastmod>2019-10-01T16:17:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-signs-on-to-sponsor-sptechcon-the-sharepoint-technology-conference/</loc>
		<lastmod>2019-10-01T16:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/11.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-support-sharepoint-2010/</loc>
		<lastmod>2019-10-01T16:17:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-signs-gold-sponsor-tec-2010-show/</loc>
		<lastmod>2019-10-01T16:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-ships-virtual-identity-server-ldap-proxy-firewall-edition-protect-secure-connected-data-stores-active-directory/</loc>
		<lastmod>2019-10-01T16:17:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-microsoft-sql-server-2008-adapter-virtual-identity-server/</loc>
		<lastmod>2019-10-01T16:17:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-latest-novell-edirectory-adapter-virtual-identity-server/</loc>
		<lastmod>2019-10-01T16:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-enhanced-virtual-identity-server-automated-compliance/</loc>
		<lastmod>2019-10-01T16:18:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-enhanced-virtual-identity-server-sharepoint/</loc>
		<lastmod>2019-10-01T16:18:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/brengs-speak-experts-conference-march-22nd25th-2009-las-vegas/</loc>
		<lastmod>2019-10-01T16:18:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-generation-virtual-identity-server-reducing-large-active-directory-group-population-processing-times-hours-seconds/</loc>
		<lastmod>2019-10-01T16:18:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idms-virtual-identity-server-multiforest-capabilities-microsofts-sharepoint/</loc>
		<lastmod>2019-10-01T16:18:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-introduces-virtual-identity-server/</loc>
		<lastmod>2019-10-01T16:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/brengs-speak-directory-experts-conference-march-3rd5th-2008/</loc>
		<lastmod>2019-10-01T16:19:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-signs-sponsor-directory-experts-conference-march-3rd5th-2008/</loc>
		<lastmod>2019-10-01T16:19:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-partners-quest-software/</loc>
		<lastmod>2019-10-01T16:19:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-extends-bmc-identity-management-net-solution-release-optimal-idm-dashboard/</loc>
		<lastmod>2019-10-01T16:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/dickerson-join-optimal-idm-identity-management-practice/</loc>
		<lastmod>2019-10-01T16:19:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/brengs-lead-optimal-idm-identity-management-practice/</loc>
		<lastmod>2019-10-01T16:19:35+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/banner-whyoptimal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-partners-bmc-software-provide-identity-management-solutions-microsoftnet/</loc>
		<lastmod>2019-10-01T16:19:43+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/banner-resources.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/fundamentals-of-blockchain/</loc>
		<lastmod>2019-10-10T15:06:33+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/02/blockchain1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/european-identity-cloud-conference-ticket-giveaway/</loc>
		<lastmod>2019-10-11T15:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/02/eic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/does-iot-have-an-identity-management-problem/</loc>
		<lastmod>2020-05-18T17:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/iot-has-identity-management-problem-768x402.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/demystifying-security-in-the-cloud/</loc>
		<lastmod>2020-05-18T17:54:41+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/security-in-the-cloud-768x402.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/four-simple-steps-online-safety/</loc>
		<lastmod>2020-05-18T18:15:24+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/steps-to-online-safety-768x384.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/navigating-a-multi-forest-office-365-migration/</loc>
		<lastmod>2020-05-18T19:27:25+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/navigating-365.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-programs-strive-for-four-nines/</loc>
		<lastmod>2020-05-18T20:06:07+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/iam-program-strive-four-nines.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/best-identity-management-solutions/</loc>
		<lastmod>2020-05-22T14:52:44+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/05/PCMag.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/jeff-bohren-infosec-world/</loc>
		<lastmod>2020-05-22T15:05:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-password-problem/</loc>
		<lastmod>2020-05-22T15:23:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/get-out-of-the-authentication-business/</loc>
		<lastmod>2020-05-26T17:46:26+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2016/03/IP-RP-graphic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2016/03/federated-trusts-graphic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/boost-cyber-maturity-level-iam/</loc>
		<lastmod>2020-07-15T18:02:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-your-business-needs-an-identity-hub/</loc>
		<lastmod>2020-07-15T18:09:07+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/business-needs-identity-hub-768x402.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-evaluate-your-identity-management-system/</loc>
		<lastmod>2020-07-15T19:55:26+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/evaluate-identity-management-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-earns-iso-27001-certification/</loc>
		<lastmod>2020-07-15T20:17:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-addresses-help-desk-issues/</loc>
		<lastmod>2020-07-15T20:33:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/three-reasons-to-consider-cloud-sso-for-apps/</loc>
		<lastmod>2020-07-15T20:37:15+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/cloud-sso-for-apps-768x512.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/gdpr-and-governance/</loc>
		<lastmod>2020-07-15T20:50:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/12/governance-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/data-controls-risk-management/</loc>
		<lastmod>2020-07-15T20:53:01+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/12/gdpr.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-customer-support-gdpr/</loc>
		<lastmod>2020-07-15T20:54:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/webinar-whats-new-whats-next-at-optimal-idm/</loc>
		<lastmod>2020-10-26T19:25:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-protect-your-child-from-identity-thieves/</loc>
		<lastmod>2020-10-28T12:59:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/authentication-authorization-and-api-enablement/</loc>
		<lastmod>2020-10-28T13:05:32+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/10/AdobeStock_263651768_API-cloud-Converted.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/7-proven-ways-to-build-customer-trust/</loc>
		<lastmod>2020-10-28T13:12:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/virtual-directory-servers/</loc>
		<lastmod>2020-11-17T16:26:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/agentless-sso/</loc>
		<lastmod>2020-11-17T16:27:11+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/04/lock-3216823_640.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/behavioral-biometrics-explained/</loc>
		<lastmod>2020-11-17T16:27:22+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/08/AdobeStock_282064697.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/blockchains-barriers-to-entry/</loc>
		<lastmod>2020-11-17T16:27:26+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/02/blockchain3-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/security-issues-for-the-semantic-web/</loc>
		<lastmod>2020-11-17T16:27:29+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/security-semantic-web.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/openid-connect-certified/</loc>
		<lastmod>2020-11-17T16:27:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/blockchain-identity-trust-fabric/</loc>
		<lastmod>2020-11-17T16:27:47+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/blockchain2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-managed-services-address-a-human-problem/</loc>
		<lastmod>2020-12-11T14:44:21+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/12/IAM-Managed-Services-Address-a-Human-Problem.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/types-of-data-breaches/</loc>
		<lastmod>2021-02-03T23:06:59+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/02/Types-of-Data-Breaches.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/17-small-business-owners-share-their-top-advice-on-navigating-the-coronavirus-outbreak/</loc>
		<lastmod>2021-03-26T17:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/solutions-review-names-optimal-idm-an-identity-management-vendor-to-watch-in-2020/</loc>
		<lastmod>2021-03-26T17:51:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-appoints-mark-foust/</loc>
		<lastmod>2021-03-26T17:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-featured-on-pcmag-best-identity-management-solutions-list-of-2020/</loc>
		<lastmod>2021-03-26T17:52:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/top-10-identity-access-management-companies-in-apac-for-2019/</loc>
		<lastmod>2021-03-26T17:55:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cso-it-news/</loc>
		<lastmod>2021-03-26T17:55:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/2017-homeland-security-award/</loc>
		<lastmod>2021-03-26T17:58:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/best-iam-solution-2019/</loc>
		<lastmod>2021-03-26T17:58:44+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/01/best-iam-solution-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/top-nsa-personnel-leaving-droves/</loc>
		<lastmod>2021-03-26T18:05:52+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/03/Cyber-skills-shortage-at-NSA.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/best-identity-management-solution/</loc>
		<lastmod>2021-03-26T18:06:18+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/02/pcmag-2018.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-named-100-promising-microsoft-solution-providers-cio-review/</loc>
		<lastmod>2021-03-26T18:08:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/top-10-authorization-solution/</loc>
		<lastmod>2021-03-26T18:08:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-fido-compliance-with-u2f-integration/</loc>
		<lastmod>2021-03-26T18:08:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/interview-how-to-protect-your-identity-in-the-workplace/</loc>
		<lastmod>2021-03-26T18:08:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-and-omada-partner-to-create-new-am-and-iga-solution-solutions-review/</loc>
		<lastmod>2021-03-26T18:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/solutions-review-presents-the-top-ciam-vendors-to-watch-in-2019/</loc>
		<lastmod>2021-03-26T18:14:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/five-things-cmos-need-to-know/</loc>
		<lastmod>2021-03-26T18:15:07+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/OptimalIDM-testimonials.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cybersecurity-threats-employees-should-know/</loc>
		<lastmod>2021-03-26T18:19:11+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/data-protection-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/protecting-critical-infrastructure/</loc>
		<lastmod>2021-03-26T18:20:09+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/10/highway.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-doubling-software-sales-revenue-year-row/</loc>
		<lastmod>2021-03-26T18:30:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/password-protection-flaw-reported/</loc>
		<lastmod>2021-03-26T18:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimalcloud-cloud-based-application-vendors/</loc>
		<lastmod>2021-03-26T18:31:16+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/cloud-vendors.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/niche-player-gartner-magic-quadrant/</loc>
		<lastmod>2021-03-26T18:35:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-cloud-computing-level-providing-powerful-solution-easily-provision-deprovision-users-cloud/</loc>
		<lastmod>2021-03-26T18:35:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-signs-sponsor-directory-experts-conference-march-22nd25th-2009/</loc>
		<lastmod>2021-03-26T18:35:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/enterprise-cio/</loc>
		<lastmod>2021-03-26T18:37:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-last-watchdog-interview/</loc>
		<lastmod>2021-03-26T18:38:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/mobile-sso/</loc>
		<lastmod>2021-03-26T18:41:17+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/mobile-sso-768x402.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/bestcompany-article-2019-identity-theft-and-scam-trends/</loc>
		<lastmod>2021-03-30T16:28:02+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/02/best-company-expert-contributor-security-badge.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cloud-federation-sso-vendor-comparison/</loc>
		<lastmod>2021-03-30T16:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/Cloud-Federation-Single-Sign-On-Vendor-Comparison_zero-configv2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/09/Delegated-Admin-Graphic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/client-abbott.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/client-ecolab-e1439487664769.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/client-kraftfoods-e1439487688886.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/client-farmers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/client-baxter.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/client-adp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/army.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/logo_09.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/FDIC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/usdoe.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/UN.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/SOF.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/SOK.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/GSK.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/SBD.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/USACE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/08/ptc-e1439488912218.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/05/microsoft1-94x119.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cost-difference-idaas-vs-on-premise/</loc>
		<lastmod>2021-03-30T16:29:44+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/cost-difference-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/http-header-session-protection/</loc>
		<lastmod>2021-03-30T16:34:12+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/12/HTTP-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/identity-access-and-governance-tech-converge-to-meet-data-protection-challenges-the-last-watchdog/</loc>
		<lastmod>2021-03-30T16:34:46+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/02/Byron-article.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/ldap-migrations-vis/</loc>
		<lastmod>2021-03-30T16:35:46+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/vis-ldap-migration.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/new-logo/</loc>
		<lastmod>2021-03-30T16:36:26+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/Optimal-IdM-new-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-diversity-of-multifactor-authentication-methods-solutions-review/</loc>
		<lastmod>2021-03-30T16:37:21+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/02/MFA-balls-in-air.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/kuppingercole-leadership-compass-identity/</loc>
		<lastmod>2021-04-14T12:52:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/a-virtual-directory-server-vds-is-a-swiss-army-knife-that-enterprise-architects-cannot-be-without/</loc>
		<lastmod>2021-04-21T19:53:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/more-reliability-and-security-for-your-enterprise/</loc>
		<lastmod>2021-04-21T19:58:16+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2016/04/web-seal-SOC2T1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/introducing-pgina/</loc>
		<lastmod>2021-05-12T12:59:19+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/pGina.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/password-free-world/</loc>
		<lastmod>2021-05-12T12:59:46+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/password-free-world-768x384.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/virtualdirectoryservice/</loc>
		<lastmod>2021-05-17T15:45:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-the-optimalcloud/</loc>
		<lastmod>2021-06-17T15:12:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-optimalcloud-deployment-scenarios/</loc>
		<lastmod>2021-06-17T16:23:58+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/optimalcloud-deployment-scenarios.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/new-partner-platform-from-optimal-idm-includes-multi-tenant-support/</loc>
		<lastmod>2021-06-17T16:27:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/5-ways-ai-is-improving-cloud-security/</loc>
		<lastmod>2021-06-24T12:45:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/7-common-security-mistakes/</loc>
		<lastmod>2021-06-24T12:56:46+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/common-security-mistakes-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/omadapressrelease/</loc>
		<lastmod>2021-06-24T13:10:00+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/11/omada-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/its-so-meta-data/</loc>
		<lastmod>2021-06-24T13:11:30+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/metadata.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-and-precise-technologies-partner-to-address-iam-market-in-middle-east-turkey-and-africa/</loc>
		<lastmod>2021-06-24T13:25:29+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/Precise-logo-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-dsml-support-virtual-identity-server/</loc>
		<lastmod>2021-06-24T13:26:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-awarded-usf-fast-56/</loc>
		<lastmod>2021-06-24T13:28:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-to-release-time-based-one-time-password-totp-into-its-cloud-federation-and-single-sign-on-solution-the-optimalcloud/</loc>
		<lastmod>2021-06-24T13:32:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/partnership-optimal-idm-system-domain/</loc>
		<lastmod>2021-06-24T13:33:44+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/12/system-domain-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/rsa-conference-2015/</loc>
		<lastmod>2021-06-24T13:35:01+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/2129_BOTE_2014_Winner.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/2129_BOTE_2014_Winner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/stop-data-leakage-dont-be-the-next-high-profile-hack/</loc>
		<lastmod>2021-06-24T13:35:09+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/11/security_locks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/typingdnas-biometric-mfa-deployed-to-us-retail-chains-pos-for-login-security/</loc>
		<lastmod>2021-06-24T13:37:39+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/09/Typing-Biometrics-Keystroke-Dynamics-1024x683-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/virtual-directory-server-for-office-365/</loc>
		<lastmod>2021-06-24T13:38:08+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/05/bote2013_winner_prodawards.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/04/award-best-teched-02.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/hotel-show-and-tell-massive-data-breach-exposes-identities/</loc>
		<lastmod>2021-06-24T15:37:16+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/01/keem-ibarra-378412-unsplash-1024x683.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/ldap-migrations-made-easy/</loc>
		<lastmod>2021-06-24T15:37:27+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/11/fish.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/06/LDAP-icon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/6-a-b-tests-you-can-run-on-your-e-commerce-cart/</loc>
		<lastmod>2021-06-25T12:41:52+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/09/6-AB-Tests-You-Can-Run-on-Your-E-Commerce-Cart.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/identity-as-the-new-perimeter-of-security/</loc>
		<lastmod>2021-07-23T12:38:12+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/02/Identity-as-the-New-Perimeter-of-Security-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/tips-for-working-at-home/</loc>
		<lastmod>2021-07-23T12:58:52+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/03/AdobeStock_325760573-e1585052009815.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/authentication-vs-authorization/</loc>
		<lastmod>2021-09-01T12:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/08/Authentication-vs.-Authorization.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/08/Authentication-vs.-Authorization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/small-and-mid-sized-businesses-have-new-alternative-for-identity-access-management-security/</loc>
		<lastmod>2021-08-25T16:04:06+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/Press-Release-image_200x200.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-data-breaches-happen/</loc>
		<lastmod>2021-08-25T16:08:25+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/08/How-Data-Breaches-Happen.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/08/How-Data-Breaches-Happen.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/analyzing-the-niche-players-2018/</loc>
		<lastmod>2021-08-25T16:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-partners-with-typingdna/</loc>
		<lastmod>2021-08-25T16:18:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-generation-virtual-identity-server-providing-codeless-point-click-solution-performing-automated-compliance-active-directory-environment/</loc>
		<lastmod>2021-08-25T16:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/government-using-identity-eliminate-red-tape/</loc>
		<lastmod>2021-08-25T16:19:37+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/RealMe-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/03/REVISED-SixSs_v2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/preventing-disaster-through-early-iam-adoption/</loc>
		<lastmod>2021-08-25T16:19:50+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/digital-identity-security-identiverse-768x412.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/customer-experience-starts-at-your-registration-screen/</loc>
		<lastmod>2021-08-25T16:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/10/Social-Identity-Support.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/10/Social-Identity-Support.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/finding-right-consumer-iam-products/</loc>
		<lastmod>2021-08-25T16:25:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/video-interview-terri-robinson/</loc>
		<lastmod>2021-08-25T16:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/mark-foust.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/podcast-mark-foust-inteview-itspmagazine/</loc>
		<lastmod>2021-08-25T16:25:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-named-a-niche-player-in-the-2019-gartner-magic-quadrant-for-access-management/</loc>
		<lastmod>2021-08-25T16:25:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/best-practices-for-better-ux-and-security/</loc>
		<lastmod>2021-09-30T15:36:25+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/best-practices-for-better-ux.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/mike-brengs-know-identity-conference/</loc>
		<lastmod>2021-09-30T15:52:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idms-mike-brengs-featured-isaca/</loc>
		<lastmod>2021-10-20T12:41:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-named-winner-of-the-global-infosec-awards-during-rsa-conference-2021/</loc>
		<lastmod>2021-10-20T12:43:40+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/05/Global-InfoSec-Awards-for-2021-Winner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-named-a-contender-in-2020-ciam-report/</loc>
		<lastmod>2021-11-22T21:12:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/10/Optimal-on-wave-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/zero-trust/</loc>
		<lastmod>2021-11-22T21:22:40+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/07/Zero-Trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-you-need-identity-management-services/</loc>
		<lastmod>2021-12-10T21:42:45+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/Capture.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-risk-based-authentication/</loc>
		<lastmod>2022-01-27T23:10:26+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/01-What-Is-Risk-Based-Authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/01-What-Is-Risk-Based-Authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/02-How-Does-Risk-Based-Authentication-Work.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/03-Benefits-of-Risk-Based-Authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/04-Can-Small-Businesses-Use-Risk-based-Authentication.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/05-Protect-Your-Business-From-Unauthorized-Access.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/codie-award-finalist/</loc>
		<lastmod>2022-03-21T17:33:44+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/05/CODIE_2019_finalist_black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-receives-2019-siia-codie-award-for-best-identity-access-security-solution/</loc>
		<lastmod>2022-03-21T17:46:26+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/06/CODIE_2019_winner_black.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-breach-that-didnt-have-to-happen/</loc>
		<lastmod>2022-03-21T17:52:09+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/06/Colonial-Pipeline.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/06/Colonial-Pipeline.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-named-winner-of-two-coveted-global-infosec-awards-during-rsa-conference-2022/</loc>
		<lastmod>2022-06-10T18:32:12+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/06/Winners-Badge-PNG-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/context-based-authentication-authorization/</loc>
		<lastmod>2022-07-14T18:32:43+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/context-based-authorization.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/google-apps-for-work/</loc>
		<lastmod>2022-09-01T01:44:05+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/Google-Apps-for-Work.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cybersecurity-challenges-in-healthcare-industry/</loc>
		<lastmod>2022-09-13T16:07:34+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/01-cybersecurity-challenges-in-healthcare-industry.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/02-why-is-healthcare-vulnerable-to-cyberattacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/03-insider-threats.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/04-how-to-prevent-cyberattacks-in-the-healthcare-industry.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/05-CTA-start-an-iam-solution-with-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-best-secure-authentication-methods-for-teams-working-from-home/</loc>
		<lastmod>2022-09-22T19:26:35+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/09/AdobeStock_331412728v2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-leaders-guide/</loc>
		<lastmod>2022-09-23T17:11:01+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/AM-and-the-bigger-scope-diagram-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-forrester-wave/</loc>
		<lastmod>2022-09-23T17:12:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/gartner-critical-capabilities-report/</loc>
		<lastmod>2022-09-23T17:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/12/crit-cap-screen-shot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/walking-the-path-to-iam-maturity/</loc>
		<lastmod>2022-10-14T19:21:27+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/Walking-down-road.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/07/optimal-idm-mg-iam-maturity-assessment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/7-steps-to-attain-a-zero-trust-security-posture/</loc>
		<lastmod>2022-10-14T19:24:31+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/08/AdobeStock_99966023.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/mergers-acquisitions-and-divestitures/</loc>
		<lastmod>2022-10-14T19:26:58+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/01/m-a-cover-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/build-vs-buy-iam-solutions/</loc>
		<lastmod>2022-10-14T19:28:23+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/build-vs-buy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/troubleshooting-federation-with-fiddler/</loc>
		<lastmod>2022-10-14T19:29:18+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/07/troubleshooting-federation-with-fiddler.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/07/debug-saml-2.0-federation-issues.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/07/troubleshooting-saml-with-fiddler.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/top-10-reasons-virtual-identity-server/</loc>
		<lastmod>2022-10-14T19:30:58+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/top-reasons-vis.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-designated-leader-on-gigaom-radar-for-multifactor-authentication/</loc>
		<lastmod>2022-10-25T12:51:40+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/gigaom-square.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/Leader-Badge_Optimal-IdM-01.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/phishing-resistant-mfa-u-s-president-sets-the-bar-for-businesses/</loc>
		<lastmod>2022-10-28T21:08:19+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/10/Phishing_AdobeStock_191525937.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-wins-prestigious-astors-award-from-american-security-today/</loc>
		<lastmod>2022-11-18T15:32:51+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/11/Astor-logo-e1732465132972.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/Astor-award-2022-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-single-sign-on/</loc>
		<lastmod>2022-11-22T18:25:10+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/07/01-what-is-single-sign-on.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/circle-of-trust-an-identity-federation-journey/</loc>
		<lastmod>2022-12-30T17:39:35+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/07/AdobeStock_311089452_lowrez.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/Circle-of-Trust-An-Identity-Federation-Journey.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/kerberos-three-headed-dog-of-identity/</loc>
		<lastmod>2022-12-30T17:40:34+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/MFA-thumbprint.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/bridging-oauth2-saml2-divide/</loc>
		<lastmod>2022-12-30T17:43:19+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/10/identity-broker.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/SAML-OAuth-Divide.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/problems-with-insecure-passwords/</loc>
		<lastmod>2022-12-30T17:48:02+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2016/05/password-header.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-was-okta-hacked-and-how-can-companies-prevent-hacks-from-occurring/</loc>
		<lastmod>2023-01-26T17:31:24+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/05/01-Why-Was-OKTA-Hacked-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/05/01-Why-Was-OKTA-Hacked.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/05/02-How-Do-Hacks-Like-This-Happen.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/05/03-Secure-Your-Business-With-Optimum-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/experience-the-optimal-difference/</loc>
		<lastmod>2023-03-13T18:30:07+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/01/biometric-typing-whitepaper.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/5-reasons-why-you-need-an-identity-provider/</loc>
		<lastmod>2023-04-11T19:24:49+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/01-5-reasons-why-you-need-an-identity-provider.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/02-5-ways-an-idp-solves-business-problems.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/03-CTA-explore-identity-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-salt-hashing/</loc>
		<lastmod>2023-04-18T13:00:03+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/01-What-Is-Salt-Hashing-and-How-Does-It-Work.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/02-Importance-of-Salting-Passwords.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/03-Contact-Optimal-IDM-to-Secure-Your-Business.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-best-thing-you-can-do-for-your-customers-that-theyll-never-notice/</loc>
		<lastmod>2023-05-23T14:55:48+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/05/the-best-thing-cover-photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-scim/</loc>
		<lastmod>2023-05-23T14:57:32+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/10/cloud-protections.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/maintaining-security-with-remote-eomployees/</loc>
		<lastmod>2023-05-23T14:57:51+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/01-Maintaining-Security-When-Employees-Work-Remotely.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/02-Secure-and-dont-overload-your-vpn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/01/03-Rely-on-Optima-IdM-for-Custom-Solutions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-releases-agentless-b2b-desktop-single-sign-on-solution-to-authenticate-vendors/</loc>
		<lastmod>2023-05-23T14:59:17+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/New-Cloud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-launches-licensing-management-assistant-to-compliment-microsoft-azure/</loc>
		<lastmod>2023-05-23T14:59:43+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/03/Favicon_Optimal-Icon.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/value-of-iam-in-businesses/</loc>
		<lastmod>2023-06-14T17:43:37+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/06/01-How-Can-IAM-Add-Value-to-Your-Organization.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/noauth-flaw/</loc>
		<lastmod>2023-06-27T16:53:35+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/06/Microsoft-Active-Directory.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/roi-with-iam/</loc>
		<lastmod>2023-06-28T17:53:42+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/06/vecteezy_roi-return-on-investment-virtual-screen-internet-business_6171431_105-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/06/01-CTA-Contact-Optimal-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-designated-as-leader-on-gigaom-radar-for-multifactor-authentication/</loc>
		<lastmod>2023-07-10T13:37:50+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/unnamed-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-vs-ai/</loc>
		<lastmod>2023-07-27T13:07:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/07/01-Preparing-for-Transformation-AI-vs-Cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/07/02-Here-are-five-benefits-of-AI-in-IAM.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/07/03-CTA-Contact-Optimal-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/protecting-phi-data/</loc>
		<lastmod>2023-08-08T19:36:59+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/05/medical-record-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-optimal-cloud-vs-on-premise-solutions/</loc>
		<lastmod>2023-08-16T12:58:54+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/07/why-the-optimal-cloud-whitepaper.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/dont-roll-the-dice-with-iam/</loc>
		<lastmod>2023-09-19T15:55:31+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/red-dice-on-green-background-close-up-2021-09-03-19-40-11-utc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/ai-and-cybercrimes/</loc>
		<lastmod>2023-09-27T17:20:30+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/01-ai-being-used-in-cyberattacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/02-the-positives-and-negatives-of-ai-regarding-cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/03-CTA-automate-your-cybersecurity-with-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-challenges-during-merger-acquisition/</loc>
		<lastmod>2023-09-27T17:41:50+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/01-4-iam-challenges-during-m-and-a.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/02-one-of-the-biggest-challenge-during-a-merger.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/03-counter-iam-challenges-during-a-merger-with-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/consumer-identity-vs-enterprise-identity/</loc>
		<lastmod>2023-09-27T17:45:55+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/01-Consumer-Identity-vs-Enterprise-Identity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/can-ai-guess-passwords/</loc>
		<lastmod>2023-09-27T17:49:27+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/01-Can-AI-Guess-Passwords.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/importance-of-iam/</loc>
		<lastmod>2023-10-18T14:25:33+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/01-why-is-identity-and-access-management-important.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/02-what-are-the-benefits-of-iam.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/03-CTA-optimal-idm-for-data-security-and-identity-access-management.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/who-is-most-affected-by-ransomware/</loc>
		<lastmod>2023-10-18T14:30:11+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/01-Who-Is-Most-Affected-by-Ransomware-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/01-Who-Is-Most-Affected-by-Ransomware-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/02-Industries-Affected-by-Ransomware-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/03-Preventing-Ransomware-With-the-OptimalCloud-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/pros-and-cons-of-using-an-idaas-solution/</loc>
		<lastmod>2023-10-18T14:31:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-2024-trends/</loc>
		<lastmod>2023-10-25T19:50:17+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/10/01-feature-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/10/02-increased-use-of-biometric.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/10/03-our-advanced-solutions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/recent-breaches-put-iam-in-spotlight/</loc>
		<lastmod>2023-10-26T15:20:41+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/10/Data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/7-tips-for-protecting-customer-data/</loc>
		<lastmod>2023-11-20T13:11:56+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/06/01-7-Tips-for-Securing-Customer-Data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-pii-problem/</loc>
		<lastmod>2023-11-20T13:12:15+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/01/PII_Whitepaper-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/tools-keep-hackers-at-bay/</loc>
		<lastmod>2023-11-20T13:12:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/seamless-secure-authentication/</loc>
		<lastmod>2023-11-20T13:12:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/buyers-guide-for-mfa/</loc>
		<lastmod>2023-11-20T13:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/MFA-thumbprint.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cloud-provisioning/</loc>
		<lastmod>2023-11-20T13:12:47+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/A-Password-Free-World-Past-Present-or-Possible-Future--768x384.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-data-breaches-happen/</loc>
		<lastmod>2023-11-20T13:13:05+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/Copy-of-Optimal-IdM-Aug-2019--768x384.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/when-to-synchornize/</loc>
		<lastmod>2023-11-20T13:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/08/synch-fed-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/six-security-features-to-look-for-in-your-crm-software/</loc>
		<lastmod>2023-11-20T13:13:28+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/08/Security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/typing-biometrics-and-other-multi-factor-authentication-methods/</loc>
		<lastmod>2023-11-20T13:18:22+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/01/biometric-whitepaper-cover-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/everything-you-need-to-know-about-passwordless-authentication/</loc>
		<lastmod>2023-11-20T13:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/05/01-Everything-You-Need-to-Know-About-Passwordless-Authentication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/05/02-Enhanced-Cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/05/03-Browse-Custom-Identity-Management-Solutions-From-Optimal-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/tips-to-protect-your-business-from-a-ransomware-attack/</loc>
		<lastmod>2023-11-28T16:41:19+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/11/01-4-tips-for-protecting-your-business-from-ransomware-attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/11/02-4-tips-to-secure-your-business-from-ransomware.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/11/03-CTA-protect-your-business-with-technology-solutions-from-optimal-idm-today.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-advanced-authentication/</loc>
		<lastmod>2024-01-10T13:30:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/01/01-Advanced-Authentication-What-Is-It-and-Why-Is-It-Important-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/01/02-Biometrics-One-of-the-most-secure-authentication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/01/03-Advanced-authentication-takes-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/01/04-Look-for-a-provider-that-offers-employee-training.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/01/03-Implement-Advanced-Authentication-With-Optimal-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/passwords-a-thing-of-the-past/</loc>
		<lastmod>2024-01-26T15:31:19+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/01/are-passwords-of-the-past.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/2022-cybersecurity-statistics/</loc>
		<lastmod>2024-02-26T17:01:06+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/01-2022-Cybersecurity-Statistics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/01-2022-Cybersecurity-Statistics.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/02-Common-Cybercrime-Attacks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/03-Government.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/04-Is-Cybersecurity-Increasing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/05-Staying-Ahead-of-the-Curve-With-Optimal-IdM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/gartner-magic-quadrant/</loc>
		<lastmod>2024-02-26T17:05:00+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2018/08/gartner.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/08/Gartner-MQ-image-2019.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/kuppingercole-analyst-executive-view-optimal-idm-and-the-optimalcloud/</loc>
		<lastmod>2024-02-26T17:12:18+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/10/Logo_KC_1280x720.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/guide-to-authentication/</loc>
		<lastmod>2024-02-26T17:30:09+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/09/1-1-Authentication-101-768x284.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/09/2-Beyond-The-Password-Identity-and-Access-768x284.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/3-The-Benefits-of-MFA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/09/4-Smartcard-Radio-Frequency-Identification-and-Biometric-Multi-Factor-Authentication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2019/09/5-Software-and-Cloud-Services-From-Optimal-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/does-my-business-need-cloud-security/</loc>
		<lastmod>2024-02-26T17:32:17+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/does-my-business-need-cloud-security.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/identity-management-challenges-for-retailers/</loc>
		<lastmod>2024-02-26T17:37:12+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/storefront-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/integrate-mobile-applications-company/</loc>
		<lastmod>2024-02-26T17:45:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/migration-road-blocks/</loc>
		<lastmod>2024-02-26T17:49:22+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/09/Roadblock_iStock-185245239.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/data-security-and-the-internet-of-things/</loc>
		<lastmod>2024-02-26T17:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/data-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/benefits-of-a-cloud-federation-broker/</loc>
		<lastmod>2024-02-26T17:53:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2015/05/broker-mode-graphic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/small-business-cyber-security-checklist/</loc>
		<lastmod>2024-04-01T13:25:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/02/01-Cybersecurity-Checklist-for-Small-Businesses.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/02/01-Cybersecurity-Checklist-for-Small-Businesses.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/02/02-The-5-Cs-of-Cybersecurity-for-Small-Businesses.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/02/03-Fortify-Your-Small-Business-With-Optimal-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cybersecurity-for-smbs/</loc>
		<lastmod>2024-05-01T16:39:08+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/01-Cybersecurity-for-SMBs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/01-Cybersecurity-for-SMBs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/02-Phishing.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/03-Ways-to-Improve-Cybersecurity-for-an-SMB.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/04-How-Optimal-IdM-Can-Help.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/05-Sign-up-for-a-Free-Trial.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/types-of-authentication-methods/</loc>
		<lastmod>2024-05-21T17:18:43+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/01-types-of-authentication-methods-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/02-what-are-the-three-types-of-authentication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/Common-Authentication-Methods-REV01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/04-what-is-the-most-secure-type-of-authentication-method.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/06/05-CTA-keep-yourself-and-your-business-secure-with-the-optimalcloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-encryption/</loc>
		<lastmod>2024-05-21T17:19:17+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/01-what-is-encryption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/02-what-are-the-types-of-encryption.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/04/03-CTA-contact-optimal-idm-today-to-optimize-your-data-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/benefits-to-a-strong-identity-solution-for-your-business/</loc>
		<lastmod>2024-05-21T17:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/03/01-How-a-Strong-Identity-Solution-Can-Protect-Your-Business.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/03/02-Improved-User-Experience.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/03/03-Explore-IAM-Solutions-With-Optimal-IDM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-protect-customer-data/</loc>
		<lastmod>2024-05-21T17:20:43+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/01-How-Companies-Can-Protect-Customer-Data.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/02-Weak-sotlen-or-default.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/03-Learn-More-About-The-OptimalCloud-at-Optimal-IdM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cybersecurity-threats-of-2023/</loc>
		<lastmod>2024-05-21T17:21:54+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/01-top-cybersecurity-threats-of-2023.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/02-multiple-threat-vectors.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/03-CTA-contact-the-team-at-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/security-question-best-practices/</loc>
		<lastmod>2024-05-21T17:23:51+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/12/01-Security-Question-Best-Practices.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-complete-guide-to-password-best-practices/</loc>
		<lastmod>2024-05-21T17:24:03+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/11/01-Password-Best-Practices-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-token-based-authentication/</loc>
		<lastmod>2024-05-21T17:25:48+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/01-What-Is-a-Brute-Force-Attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/02-Tokens-are-uniquely.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/03-When-to-Use-Authentication-Tokens.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/04-Benefits-of-Token-Based-Authentication-Pinterest.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/05-Manage-Identity-Access-With-Optimal-IdM.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-is-a-brute-force-attack/</loc>
		<lastmod>2024-05-21T17:25:57+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/01-What-Is-a-Brute-Force-Attack-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/02-Types-of-Brute-Force-Attacks-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/03-How-Do-Brute-Force-Attacks-Work-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/04-How-Can-You-Prevent-a-Brute-Force-Attack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/09/05-Contact-Optimal-IdM-Today-min.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/gartner-iam-buyers-guide-for-access-management/</loc>
		<lastmod>2024-05-21T17:55:42+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/AM-Business-Drivers-and-the-Related-Core-Value-Propositions.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/AM-Business-Drivers-and-the-Related-Core-Value-Propositions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-and-mammoth-cyber-announce-strategic-partnership-to-deliver-secure-enterprise-access-and-prevent-data-loss/</loc>
		<lastmod>2024-06-11T12:00:35+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/06/Mammoth_Cyber_Logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-importance-of-robust-security-measures-in-iam-platforms/</loc>
		<lastmod>2024-06-10T14:41:40+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/06/hacking-6694207_1280.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/06/hacking-6694207_1280.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/02/03-Fortify-Your-Small-Business-With-Optimal-IdM.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/automating-compliance-how-iam-streamlines-audit-processes-and-reduces-manual-effort/</loc>
		<lastmod>2024-09-03T17:07:39+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/08/IAM-Compliance-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/08/IAM-Compliance-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/mfa-in-compliance/</loc>
		<lastmod>2024-09-03T17:09:39+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/08/mfa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/08/mfa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/types-of-biometrics-sensors/</loc>
		<lastmod>2024-09-03T17:15:32+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/01-introduction-to-biometric-authentication.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/02-the-advantages-of-biometrics.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-emerging-identity-consolidation-need/</loc>
		<lastmod>2024-09-03T17:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/02/VIS-Is-About-Applications.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-enterprise-single-sign-on-esso-unlocks-efficiency-in-business-operations/</loc>
		<lastmod>2024-09-18T02:12:49+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/09/sso.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/zero-trust-in-next-gen-iam/</loc>
		<lastmod>2024-10-17T03:19:51+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/10/Zero-Trust_Blog-Graphic_Final.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/modern-iam/</loc>
		<lastmod>2025-01-19T15:51:25+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/01/Modern-IAM.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/iam-from-password-management-to-ai-driven-security/</loc>
		<lastmod>2025-01-19T16:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/01/AI-and-IAM.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/extending-iam-to-the-next-level-with-credential-management-icam-a-practical-guide/</loc>
		<lastmod>2025-04-09T04:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/04/ICAM-Blog-image.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/fidoalliance-passkey-press-release/</loc>
		<lastmod>2025-04-09T16:11:24+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/04/OptimalCloud-icon-no-tag_198x57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/federated-and-step-up-authentication/</loc>
		<lastmod>2025-04-23T11:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/04/OptimalCloud-icon-no-tag_198x57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-announces-deep-integration-with-microsoft-teams-for-enhanced-mfa-real-time-monitoring-and-alerting/</loc>
		<lastmod>2025-04-21T16:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/04/OptimalCloud-icon-no-tag_198x57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/rsa-2025-recap/</loc>
		<lastmod>2025-05-21T02:28:10+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/05/RSAC2025-scaled-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/soc-2-audit-completion/</loc>
		<lastmod>2025-07-15T11:46:53+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/07/A_LIGN_badge_SOC_2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/train-your-hr-teams-to-identify-deepfake-job-candidates/</loc>
		<lastmod>2025-07-14T23:58:35+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/05/Deepfake.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/5-benefits-of-implementing-biometric-authentication-in-cybersecurity/</loc>
		<lastmod>2025-07-14T23:59:12+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2024/01/Untitled-design-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/15-ways-ai-and-vr-can-enhance-education/</loc>
		<lastmod>2025-07-14T23:59:45+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/10/Axon-Park-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/top-providers-to-work-with-customer-identity-and-access-management/</loc>
		<lastmod>2025-07-19T13:15:15+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/06/Customer-Identity-and-Access-Management-Providers-To-Work-With.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/okta-exposes-passwords-in-clear-text-for-possible-theft/</loc>
		<lastmod>2025-07-19T13:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/07/Dark-Reading-logo_200x30.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-detect-if-a-remote-job-applicant-is-legit-or-a-deepfake-candidate/</loc>
		<lastmod>2025-07-19T13:15:49+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/10/zero-Trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-truth-about-ai-in-cloud-security/</loc>
		<lastmod>2025-07-19T13:16:08+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/01/Cloud-AI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-balance-employee-privacy-and-business-security/</loc>
		<lastmod>2025-07-19T13:16:27+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/Cyber-security-and-privacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/understanding-data-privacy-laws/</loc>
		<lastmod>2025-07-19T13:16:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/02/data-privacy-laws-overview-2048x1152-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/5-best-practices-for-data-warehousing/</loc>
		<lastmod>2025-07-19T13:16:52+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/05/pexels-tiger-lily-4483610-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/6-outdated-cybersecurity-practices-to-avoid/</loc>
		<lastmod>2025-07-19T13:17:09+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/07/Brilliance-Magazine-e1688395770197-145x150-1.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/these-are-the-most-spoofed-brands-in-phishing-in-2023/</loc>
		<lastmod>2025-07-19T13:17:20+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/spoofing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-artificial-intelligence-empowers-zero-trust/</loc>
		<lastmod>2025-07-19T13:17:33+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/How-Artificial-Intelligence-Empowers-Zero-Trust.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/8-tips-for-best-results-in-red-teaming/</loc>
		<lastmod>2025-07-19T13:17:43+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2023/09/8-tips-for-red-teaming.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/monday-com-vs-clickup-project-management-software-comparison/</loc>
		<lastmod>2025-07-19T13:18:19+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/05/pinkypillsistock-533699494.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/5-remote-training-best-practices-for-your-business/</loc>
		<lastmod>2025-07-19T13:18:29+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/04/blog5site_4-22-22_Remote-Training-for-your-Business_DepositphotosL-750x500-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-create-your-own-online-proxy-server-in-minutes/</loc>
		<lastmod>2025-07-19T13:18:44+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2022/03/internet-security-screen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-implications-of-big-techs-meeting-with-biden/</loc>
		<lastmod>2025-07-19T13:18:58+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/10/SECUDE.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-better-secure-user-authentication-protocols/</loc>
		<lastmod>2025-07-19T13:19:23+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/10/ATT-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/twitch-adds-new-phone-verification-option-to-avoid-bot-attacks/</loc>
		<lastmod>2025-07-19T13:19:42+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/10/vgr-blog.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-rise-of-identity-access-management-in-fintech/</loc>
		<lastmod>2025-07-19T13:19:57+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/09/FinTech-review.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/4-it-priorities-in-the-wfh-era/</loc>
		<lastmod>2025-07-19T13:20:08+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/09/Wire19.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/top-5-cyber-exposures-tied-to-the-rising-use-of-international-remote-workforces/</loc>
		<lastmod>2025-07-19T13:20:18+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/09/The-Last-Watchdog.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/09/The-Last-Watchdog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/securing-the-cloud-with-biometric-data/</loc>
		<lastmod>2025-07-19T13:20:29+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/09/The-Chief-IO.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/after-bitcoin-soars-experts-warn-more-regulations-could-follow/</loc>
		<lastmod>2025-07-19T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/02/bitcoin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-choose-the-right-wordpress-theme-for-your-e-commerce-business/</loc>
		<lastmod>2025-07-19T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/02/wordpress-blog-image.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-prepare-for-another-wfh-quarter/</loc>
		<lastmod>2025-07-19T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/02/Working-From-Home.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-your-startups-should-care-more-about-data-security/</loc>
		<lastmod>2025-07-19T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/03/IAM_AdobeStock_140264140-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-secure-your-devices-at-home-and-at-work/</loc>
		<lastmod>2025-07-19T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/10/AdobeStock_170618007-scaled.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/7-ways-youll-need-to-approach-cybersecurity-after-covid-19/</loc>
		<lastmod>2025-07-19T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/11/covid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-to-secure-employees-home-networks/</loc>
		<lastmod>2025-07-19T13:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/11/Employee-Home-Networks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/ransomware-posing-as-a-coronavirus-app-is-threatening-people-for-money/</loc>
		<lastmod>2025-07-19T13:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/tips-for-working-at-home-advice-from-a-virtual-business-owner/</loc>
		<lastmod>2025-07-19T13:22:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/where-will-the-cybersecurity-industry-be-post-pandemic/</loc>
		<lastmod>2025-07-19T13:22:42+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/09/corona-virus-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/best-practices-for-improving-employee-cyber-awareness/</loc>
		<lastmod>2025-07-19T13:22:42+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/10/zeguro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/6-ways-blockchain-is-impacting-marketing-and-how-to-take-advantage-of-it/</loc>
		<lastmod>2025-07-19T13:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/snyk-releases-a-kubernetes-focused-container-security-platform/</loc>
		<lastmod>2025-07-19T13:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/5-ways-to-create-a-better-customer-experience-and-increase-sales/</loc>
		<lastmod>2025-07-19T13:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/4-security-authentication-updates-for-2020/</loc>
		<lastmod>2025-07-19T13:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/what-to-know-about-user-authentication-and-cyber-security/</loc>
		<lastmod>2025-07-19T13:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/why-biometrics-will-soon-have-a-big-impact-on-iot-technology/</loc>
		<lastmod>2025-07-19T13:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-state-of-the-ransomware-problem/</loc>
		<lastmod>2025-07-19T13:24:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/5-big-data-vulnerabilities-you-could-be-overlooking/</loc>
		<lastmod>2025-07-19T13:24:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/tools-techniques-for-employee-security-awareness-training/</loc>
		<lastmod>2025-07-19T13:24:49+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/tools-techniques-optimal-idm-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/extending-the-mine/</loc>
		<lastmod>2025-07-19T13:27:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/how-jeff-bohren-became-software-architect/</loc>
		<lastmod>2025-07-19T13:27:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/11/image001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/podcast-itsp-radio/</loc>
		<lastmod>2025-07-19T13:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cybersecurity-lax-mar-lago/</loc>
		<lastmod>2025-07-19T13:27:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/05/tnw-logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/inside-your-network/</loc>
		<lastmod>2025-07-19T13:27:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2020/05/CDM-cover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/podcast-iam/</loc>
		<lastmod>2025-07-19T13:27:36+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2017/10/Bohren-and-Acohido.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/cloud-security-challenges/</loc>
		<lastmod>2025-07-19T13:27:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/us-companies-gdpr-compliance/</loc>
		<lastmod>2025-07-19T13:29:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/mfa-for-microsoft-azure/</loc>
		<lastmod>2025-07-21T11:25:30+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/04/OptimalCloud-icon-no-tag_198x57.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/fido-passkey-pledge/</loc>
		<lastmod>2025-08-10T16:08:44+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/08/Passkey-Pledge_A-2-color-e1754842008707.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/zero-trust-architecture-in-post-merger-environments-a-practical-guide/</loc>
		<lastmod>2025-09-03T22:20:46+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/09/Zero-Trust-Architecture-in-Post-Merger_v2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/20-years-of-innovation/</loc>
		<lastmod>2025-09-27T13:46:50+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/09/Gold-Anniversary-Badge-Round-Logo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/hidden-costs-of-directory-migration-during-ma/</loc>
		<lastmod>2025-09-29T23:39:05+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/08/Add-a-heading-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/optimal-idm-celebrates-20-years-of-innovation-and-customer-success/</loc>
		<lastmod>2025-09-29T23:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/09/Gold-Anniversary-Badge-Round-Logo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/when-cloud-giants-fall/</loc>
		<lastmod>2025-11-19T03:01:57+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/11/Add-a-heading.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/directory-services-dilemma/</loc>
		<lastmod>2025-12-03T01:31:13+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/12/AZrhwBD1C_Xg0Zh77p6hKw-AZrhwBD1PVOSqE66dyY4UA.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/2026-iam-trends/</loc>
		<lastmod>2025-12-09T18:06:31+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/12/2026-Identity-and-Access-Management-Trends-Embracing-a-Passwordless-AI-Driven-Future-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/nhi/</loc>
		<lastmod>2025-12-16T12:29:17+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2025/12/Securing-Non-Human-Identities.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://optimalidm.com/resources/blog/the-ai-identity-crisis/</loc>
		<lastmod>2026-03-08T17:53:29+00:00</lastmod>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2026/03/Add-a-heading-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://optimalidm.com/wp-content/uploads/2021/12/03-CTA-choose-custom-iam-solutions-from-optimal-idm.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->