<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.beyondidentity.ai</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/pricing</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/demo</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/roadmap</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/ai-agents-all-the-fun-of-an-insider-threat-none-of-the-hr-paperwork</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/an-ai-first-design-approach-to-creating-an-agentic-experience</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/can-ai-agents-actually-hack-systems-legitimate-cybersecurity-podcast</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/credential-infrastructure-for-an-agentic-world</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/govern-ai-through-conversation</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/governing-autonomous-agents-that-guard-us</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/how-are-attackers-using-ai-and-how-can-you-stop-them</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/how-one-android-developer-ships-full-stack-with-claude-code</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/how-to-securely-run-claude-code-in-your-enterprise</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/introducing-ceros-the-agentic-ai-trust-layer-now-open-for-public-preview-2</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/is-ai-generated-code-safe-a-deep-dive-into-claude-code-security</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/the-ai-agent-security-problem-you-didnt-know-you-had-until-now</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/the-purpose-built-security-layer-for-claude-code</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/what-happens-when-a-marketer-uses-ai-to-work-like-an-engineer</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/whats-installed-isnt-whats-governed</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/whats-new-in-ceros-mcp-gateway-tool-policy-enforcement-and-agent-detection-improvements</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/whats-new-in-ceros-token-analytics-expanded-mcp-connectors-and-tenant-api-tokens</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/why-traditional-identity-systems-are-insufficient-in-the-age-of-autonomous-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/you-just-bought-claude-code-for-your-team-now-what</loc>
    </url>
    <url>
        <loc>https://www.beyondidentity.ai/blog/your-first-5-minutes-with-ceros-see-what-youve-been-missing</loc>
    </url>
</urlset>