<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.andromedasecurity.com</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/platform</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/contact</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/privacy</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/terms</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/careers</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/about</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/partner-deal-registration</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/sla</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/all-resources</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/gartner-iam-2024</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/glossary</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/idac</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/rightsizepermissions</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/rsac-2025</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/webinar/securing-nhi-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/data-sheets</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/press-releases</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blackhat-2025</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/eula</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/integrations</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/use-case/nhi</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/gartner-iam-2025</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/use-case/jit</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/use-case/ispm</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/use-case/identity-governance-uar</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/use-case/least-privilege</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/reports</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/events/rsac-2026-identity-ai-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/use-case/agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/newsletter</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/6-cloud-identity-best-practices-for-breach-prevention</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/agentic-ai-authorization-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/ai-agents-identity-agentic-trust</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/ai-driven-jit-access</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/andromeda-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/andromeda-emerges-from-stealth-to-bring-vital-context-to-enterprise-identity-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/andromeda-listed-as-top-startup-in-fortune-cyber60</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/andromeda-security-identity-signal-q325</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/andromeda-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/automated-just-in-time-access-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/automated-user-access-reviews-success</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/best-practices-for-nhi-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/ciso-alert-human-identity-nhi-must-be-addressed-together</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/cloud-iam-ny-dfs-2025</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/cyberbytes-interview-murali-basavaiah-identity-access-ai</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/cyberbytes-podcast-securing-the-future-of-identity-security-with-ashish-shah-andromeda</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/future-of-user-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/how-andromeda-security-helps-with-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/how-pci-dss-4-0-impacts-human-and-nhi-identity-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/how-to-automate-jit-access-for-high-security-and-improved-productivity</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/identity-security-ai-founders-report</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/identity-security-platform-enhancements-2025</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/identity-signal-4-2026</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/identity-week-startup-pitch-1</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/identity-week-startup-pitch-2</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/news-ai-user-access-review-launch</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/non-human-identity-security-crisis</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/prevent-ransomware-extortion-from-identity-breaches</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/rightsize-your-permissions-for-human-users-nhi</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/rsac-365-innovation-showcase-identity-security-in-the-world-of-ai</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/securing-your-digital-assets-iso-27001-and-andromeda-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/smart-jit-access-automation</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/the-fundamentals-of-nhi</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/the-shadow-admin---coming-to-a-server-near-you</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/the-undead-identities-a-chilling-tale-of-identity-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/resource/troy-wilkinson-stephen-garcia</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/6-cloud-identity-best-practices-for-breach-prevention</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/agentic-ai-authorization-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/ai-agents-identity-agentic-trust</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/ai-driven-jit-access</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/andromeda-listed-as-top-startup-in-fortune-cyber60</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/andromeda-security-identity-signal-q325</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/automated-just-in-time-access-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/ciso-alert-human-identity-nhi-must-be-addressed-together</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/cloud-iam-ny-dfs-2025</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/future-of-user-access-reviews</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/how-pci-dss-4-0-impacts-human-and-nhi-identity-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/how-to-automate-jit-access-for-high-security-and-improved-productivity</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/non-human-identity-security-crisis</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/prevent-ransomware-extortion-from-identity-breaches</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/proactive-identity-defense-supply-chain-breach</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/secure-agentic-ai-identity</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/securing-your-digital-assets-iso-27001-and-andromeda-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/the-fundamentals-of-nhi</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/the-shadow-admin---coming-to-a-server-near-you</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/blogs/the-undead-identities-a-chilling-tale-of-identity-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/best-practices-for-nhi-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/cyberbytes-interview-murali-basavaiah-identity-access-ai</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/cyberbytes-podcast-securing-the-future-of-identity-security-with-ashish-shah-andromeda</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/identity-at-the-center-podcast-rightsize-roles-and-permissions-across-human-and-machine-identities</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/identity-week-startup-pitch-1</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/identity-week-startup-pitch-2</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/rsac-365-innovation-showcase-identity-security-in-the-world-of-ai</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/videos/troy-wilkinson-stephen-garcia</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/data-sheets/andromeda-data-sheet</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/data-sheets/andromeda-solution-brief</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/data-sheets/how-andromeda-security-helps-with-iso-27001</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/data-sheets/rightsize-your-permissions-for-human-users-nhi</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/data-sheets/smart-jit-access-automation</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/press-releases/andromeda-emerges-from-stealth-to-bring-vital-context-to-enterprise-identity-security</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/press-releases/identity-security-platform-enhancements-2025</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/press-releases/news-ai-user-access-review-launch</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/press-releases/unified-identity-security-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/reports/identity-security-ai-founders-report</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/case-studies/automated-user-access-reviews-success</loc>
    </url>
    <url>
        <loc>https://www.andromedasecurity.com/newsletters/identity-signal-4-2026</loc>
    </url>
</urlset>