<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.pingidentity.com/de.html</loc><lastmod>2025-10-01T00:23:48.15Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform.html</loc><lastmod>2025-09-26T18:12:13.183Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/solutions.html</loc><lastmod>2023-05-03T17:05:39.935Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/solutions/partner.html</loc><lastmod>2022-10-19T17:28:51.549Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pricing.html</loc><lastmod>2025-06-10T14:47:27.65Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/deployment-options.html</loc><lastmod>2025-05-16T17:32:38.166Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/autonomous-identity.html</loc><lastmod>2024-11-08T20:54:17.591Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/software-development-kits.html</loc><lastmod>2025-02-21T23:11:51.772Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-advanced-identity-cloud.html</loc><lastmod>2025-06-16T15:55:15.126Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-advanced-identity-cloud-architecture.html</loc><lastmod>2024-05-30T22:13:51.279Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/identity-relationship-visualization.html</loc><lastmod>2024-05-10T16:21:20.059Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-for-customers.html</loc><lastmod>2025-05-06T19:05:01.732Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-for-workforce.html</loc><lastmod>2025-05-06T19:05:02.222Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-advanced-services.html</loc><lastmod>2025-08-11T21:29:06.669Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/cloud-containerization.html</loc><lastmod>2025-07-11T16:08:51.878Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories.html</loc><lastmod>2024-12-05T14:55:37.249Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories/3615-flinks.html</loc><lastmod>2025-06-18T22:33:46.205Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories/3554-d-b-schenker.html</loc><lastmod>2025-06-18T22:36:43.606Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories/3604-fluent-commerce.html</loc><lastmod>2025-06-18T22:39:15.684Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories/3712-raiffeisen-bank-international.html</loc><lastmod>2024-10-23T22:18:05.113Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company.html</loc><lastmod>2023-04-06T19:22:52.728Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/upcoming-events.html</loc><lastmod>2025-09-29T19:34:57.134Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/about-us.html</loc><lastmod>2025-07-30T15:45:27.393Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/security-at-ping-identity.html</loc><lastmod>2022-04-11T00:27:22.651Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/security-at-ping-identity/form-unavailable.html</loc><lastmod>2022-01-28T16:29:30.801Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/leadership.html</loc><lastmod>2025-07-03T12:55:21.897Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/championing-every-identity.html</loc><lastmod>2024-12-06T18:06:59.785Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/championing-every-identity/esg.html</loc><lastmod>2024-12-06T18:12:58.176Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/championing-every-identity/dei.html</loc><lastmod>2024-10-08T18:49:05.354Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp.html</loc><lastmod>2022-02-08T23:09:34.211Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center.html</loc><lastmod>2022-02-08T23:09:44.462Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center-thank-you.html</loc><lastmod>2022-02-08T23:09:44.848Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center-request.html</loc><lastmod>2022-02-08T23:09:45.167Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center-request-thank-you.html</loc><lastmod>2022-02-08T23:09:45.567Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo.html</loc><lastmod>2025-06-30T15:12:09.207Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/neo.html</loc><lastmod>2023-04-12T19:22:11.562Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/credentialing.html</loc><lastmod>2023-10-23T17:38:13.306Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/verification.html</loc><lastmod>2023-04-25T16:58:49.085Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/integrations.html</loc><lastmod>2023-04-24T17:30:16.57Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/decentralized-identity-101.html</loc><lastmod>2025-01-16T17:14:48.511Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pinghelix.html</loc><lastmod>2025-09-26T18:12:13.181Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/customer-identity-access-management-landscape.html</loc><lastmod>2024-12-05T15:15:54.308Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/pingandforgerock.html</loc><lastmod>2025-09-26T18:12:13.181Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4076-2024-consumer-survey-improved-digital-experiences.html</loc><lastmod>2024-11-25T15:18:40.849Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/p.html</loc><lastmod>2024-10-25T14:27:59.31Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/p/aws.html</loc><lastmod>2024-11-04T23:02:18.482Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4099-how-leading-brands-stop-fraud-prevent-threats.html</loc><lastmod>2025-04-24T15:22:29.025Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4098-stop-identity-fraud.html</loc><lastmod>2025-04-29T21:21:44.271Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4101-reduce-new-account-fraud-risks.html</loc><lastmod>2025-04-29T22:11:40.179Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4102-align-tech-business-drive-transformation.html</loc><lastmod>2025-04-29T22:12:54.675Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4103-fraud-prevention-ciam-checklist.html</loc><lastmod>2025-04-29T20:55:34.089Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4105-account-takeover-prevention.html</loc><lastmod>2025-04-29T20:38:35.986Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4107-keeping-out-fraudsters.html</loc><lastmod>2025-04-29T20:42:25.305Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4108-identity-new-account-fraud.html</loc><lastmod>2025-04-29T21:11:57.201Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4110-10-must-have-ciam-capabilities.html</loc><lastmod>2025-04-29T22:15:59.023Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/trust-every-digital-moment.html</loc><lastmod>2025-09-26T18:12:13.182Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources.html</loc><lastmod>2023-05-11T14:30:42.932Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog.html</loc><lastmod>2023-04-05T14:22:06.232Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/posts.html</loc><lastmod>2022-04-18T15:32:56.823Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/jwt-security-nobody-talks-about.html</loc><lastmod>2024-10-08T15:38:38.726Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/simple-open-banking-payments-decoupled-authentication.html</loc><lastmod>2023-09-21T23:41:46.996Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-cybercriminals-dont-want-you-to-know-about-sso.html</loc><lastmod>2024-03-20T18:21:55.176Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pingdatagovernance-securing-customer-data.html</loc><lastmod>2024-03-20T18:26:54.481Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/build-buy-strong-case-buying-ciam-solution.html</loc><lastmod>2024-03-18T18:01:21.971Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/risk-based-authentication-integrations.html</loc><lastmod>2024-11-18T18:05:02.726Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/evaluate-identity-integrations.html</loc><lastmod>2024-01-30T21:19:46.002Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/strong-performer-forrester-wave-ciam.html</loc><lastmod>2023-10-31T18:53:19.803Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/intelligent-workforce-authentication-decisions.html</loc><lastmod>2023-10-19T17:06:30.762Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/remote-work-zero-trust.html</loc><lastmod>2024-03-12T18:04:04.467Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/three-breaches-zero-trust-could-have-been-prevented.html</loc><lastmod>2024-03-12T18:07:45.844Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/workforce-identity-can-ensure-digital-transformation-success.html</loc><lastmod>2024-03-20T18:26:04.316Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/zoom-zscaler-ping-integrations-secure-work-from-home.html</loc><lastmod>2023-10-19T20:08:25.197Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/5-authentication-experiences-drive-customers-away-cost-revenue.html</loc><lastmod>2023-12-14T16:22:19.523Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/work-from-home-how-to-keep-employees-productive-secure.html</loc><lastmod>2024-04-01T19:37:52.277Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/data-privacy-consent-building-strong-customer-relationships.html</loc><lastmod>2023-10-19T20:09:19.719Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-does-passwordless-really-mean.html</loc><lastmod>2024-02-15T20:18:33.45Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/refresh-token-rotation-spa.html</loc><lastmod>2023-01-24T21:17:47.572Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/top-benefits-sso.html</loc><lastmod>2024-01-30T23:13:52.952Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/eight-benefits-mfa.html</loc><lastmod>2024-03-12T18:22:19.272Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/one-time-password-ultimate-guide.html</loc><lastmod>2024-10-04T21:49:41.497Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ultimate-guide-token-based-authentication.html</loc><lastmod>2024-06-19T16:07:22.025Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/account-takeover-ato-fraud.html</loc><lastmod>2024-03-12T20:15:16.702Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-web-access-management-wam.html</loc><lastmod>2025-02-21T22:41:18.576Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/personal-identity-future-digital-interactions.html</loc><lastmod>2025-06-09T21:59:41.633Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/iam-security-overview.html</loc><lastmod>2024-03-12T20:18:42.815Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/authentication-vs-authorization.html</loc><lastmod>2024-03-12T20:11:27.743Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping4good-planting-trees.html</loc><lastmod>2023-01-24T22:45:19.548Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/securing-next-generation-workforce.html</loc><lastmod>2024-11-18T18:29:03.257Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ciam-better-digital-experiences.html</loc><lastmod>2023-09-26T16:04:28.994Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ultimate-guide-authentication.html</loc><lastmod>2023-09-26T16:08:18.651Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/everything-need-know-online-fraud.html</loc><lastmod>2025-06-09T22:17:54.001Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/thomas-schneider-productive-employees-sso.html</loc><lastmod>2024-03-12T18:43:17.399Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/provide-best-authentication-experience.html</loc><lastmod>2025-06-09T22:07:40.156Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/you-need-iam-mdm-in-todays-wfa-world.html</loc><lastmod>2024-10-29T14:47:24.293Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/hybrid-cloud-identity-2021.html</loc><lastmod>2025-06-09T22:05:31.934Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/getting-started-with-zero-trust.html</loc><lastmod>2024-11-18T18:27:24.109Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/dynamic-authorization.html</loc><lastmod>2023-09-26T21:36:04.901Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pingidentity-now-in-AWS-marketplace.html</loc><lastmod>2023-09-27T22:36:06.377Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/sso-vs-federated-identity-management.html</loc><lastmod>2024-03-20T18:23:09.955Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/engage-customers-identity-verification.html</loc><lastmod>2023-10-10T22:29:28.21Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/top-6-identity-industry-predictions-2021.html</loc><lastmod>2023-10-19T17:04:57.81Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/counter-fraud-strategy.html</loc><lastmod>2023-01-24T23:01:05.118Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-privileged-account-management-pam.html</loc><lastmod>2024-01-25T20:30:25.417Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-best-of-breed-technology.html</loc><lastmod>2023-11-02T19:45:07.949Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pings-net-promoter-score.html</loc><lastmod>2023-01-24T23:04:15.784Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/prevent-account-takeover-ato-fraud-banking-financial-services.html</loc><lastmod>2023-11-01T19:50:20.861Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/3-ways-fin-serv-enterprise-architects-embrace-dynamic-auth.html</loc><lastmod>2024-06-18T16:41:02.228Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/encryption-vs-hashing-vs-salting.html</loc><lastmod>2023-11-01T21:56:04.578Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/api-security-zombie-apis.html</loc><lastmod>2023-08-24T19:19:48.82Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identification-vs-verification-vs-authentication.html</loc><lastmod>2023-11-02T16:39:54.384Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-online-fraud-monitoring.html</loc><lastmod>2023-11-02T19:38:08.423Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/preventing-data-breaches-with-iam.html</loc><lastmod>2024-03-12T20:26:58.98Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/top-ciam-benefits-financial-services.html</loc><lastmod>2025-02-19T20:53:24.837Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ecommerce-boom-iam.html</loc><lastmod>2023-01-24T23:10:53.683Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/barrierfree-secure-customer-experience.html</loc><lastmod>2025-02-19T20:54:48.336Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/girls-day-germany.html</loc><lastmod>2023-01-24T23:17:10.961Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/complete-guide-to-api-security.html</loc><lastmod>2024-10-04T21:24:45.663Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/how-big-is-the-cloud.html</loc><lastmod>2024-02-15T16:31:58.113Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-knowledge-based-authentication-kba.html</loc><lastmod>2023-11-02T17:03:44.263Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-out-of-band-authentication-ooba.html</loc><lastmod>2023-11-02T18:54:35.506Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-principle-of-least-privilege-polp.html</loc><lastmod>2024-03-12T18:15:38.511Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-sms-authentication.html</loc><lastmod>2023-11-02T16:54:41.854Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/oauth-vs-openid-connect.html</loc><lastmod>2023-11-01T18:11:44.206Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/best-identity-and-access-management-iam-tools.html</loc><lastmod>2024-03-12T18:32:05.839Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/rbac-vs-abac.html</loc><lastmod>2023-12-19T21:28:11.387Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/insurance-industry-iam-solutions.html</loc><lastmod>2024-03-12T20:20:35.216Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-governance-administration.html</loc><lastmod>2024-03-12T20:32:04.682Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-proofing-access-management-fraud-detection-convergence.html</loc><lastmod>2023-12-19T21:36:07.591Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-brute-force-attack.html</loc><lastmod>2023-01-24T23:33:16.022Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ransomware-detection-and-prevention.html</loc><lastmod>2024-03-12T18:10:38.115Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/password-future.html</loc><lastmod>2023-01-24T23:37:52.513Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/detect-and-prevent-website-bots.html</loc><lastmod>2023-12-19T21:38:29.469Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-progressive-profiling.html</loc><lastmod>2023-01-24T23:43:26.975Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/international-womens-day-helps-break-the-bias-all-year.html</loc><lastmod>2023-01-24T23:48:28.498Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/dynamic-authorization-role-fraud-prevention.html</loc><lastmod>2023-01-24T23:58:14.951Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-account-creation-fraud.html</loc><lastmod>2023-02-02T23:33:19.959Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/online-fraud-monitoring-facets.html</loc><lastmod>2023-01-24T23:58:18.724Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-to-know-about-passwordless-authentication.html</loc><lastmod>2023-02-02T23:33:22.263Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/how-ai-changes-cybersecurity.html</loc><lastmod>2024-04-01T13:02:33.021Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-microsoft-workday-digital-credential-verification-software.html</loc><lastmod>2024-03-20T19:31:45.431Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/cybersecurity-awareness-best-practices.html</loc><lastmod>2023-01-25T00:00:44.868Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pingone-davinci-technology-partner.html</loc><lastmod>2023-12-19T21:32:20.845Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2022-forrester-wave-ciam-leader.html</loc><lastmod>2023-12-19T22:20:57.141Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-orchestration-accelerates-passwordless-vision.html</loc><lastmod>2024-11-09T04:41:25.572Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2022-leader-gartner-iam-magic-quadrant.html</loc><lastmod>2023-02-09T18:15:22.149Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-youniverse-london-2022-recap.html</loc><lastmod>2023-03-09T19:17:21.045Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ultimate-guide-to-retail-customer-identity.html</loc><lastmod>2023-02-22T20:39:23.555Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/use-identity-to-give-customers-what-they-want.html</loc><lastmod>2023-02-23T20:06:17.718Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/build-or-buy-customer-identity-solutions.html</loc><lastmod>2024-03-28T21:25:36.723Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-identity-business-case-build.html</loc><lastmod>2023-03-02T23:15:05.703Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ciam-trends.html</loc><lastmod>2025-02-19T20:56:45.498Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/authorized-push-payment-fraud.html</loc><lastmod>2023-04-26T22:08:23.308Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2022-kuppingercole-leadership-compass-ciam-platforms.html</loc><lastmod>2025-02-21T22:09:46.21Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-cloud-capital-one.html</loc><lastmod>2024-11-04T20:36:01.257Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/fraud-decisioning-orchestration.html</loc><lastmod>2025-02-03T18:48:05.973Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/how-fido-passkeys-accelerate-passwordless-future.html</loc><lastmod>2023-03-06T16:29:33.53Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/grow-your-enterprise-securely-in-the-metaverse.html</loc><lastmod>2023-09-25T22:58:24.555Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/securely-using-oidc-authorization-code-flow-public-client-single-page-apps.html</loc><lastmod>2024-01-30T21:26:04.931Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping4good-helps-restore-rwandas-forests.html</loc><lastmod>2023-02-28T21:33:11.17Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ciam-survey-takeaways.html</loc><lastmod>2025-06-09T21:57:07.18Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/protect-financial-apis-manage-supply-chain-risk.html</loc><lastmod>2023-03-24T21:32:02.194Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/announcing-pingone-neo-decentralized-identity.html</loc><lastmod>2023-11-13T19:38:17.16Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/zero-trust-financial-services.html</loc><lastmod>2023-05-02T18:12:09.335Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2023-girls-day-germany.html</loc><lastmod>2024-03-18T16:19:25.274Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/three-trends-identity-management-day.html</loc><lastmod>2023-06-16T20:53:55.816Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/passwordless-in-security-it-leader-self-help-guide.html</loc><lastmod>2023-07-06T18:54:52.355Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/balancing-cost-security-and-experience-with-identity-orchestration.html</loc><lastmod>2023-06-28T18:43:58.998Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-customer-identity-and-access-management-ciam.html</loc><lastmod>2023-10-24T15:23:24.206Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/financial-services-identity-verification.html</loc><lastmod>2023-07-05T22:59:42.586Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/helping-hands-ping-day-of-giving-back.html</loc><lastmod>2023-08-11T16:10:12.213Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/flexible-iam-deployment-options.html</loc><lastmod>2023-08-18T14:54:40.283Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/introducing-pingone-for-customers-passwordless-solution.html</loc><lastmod>2023-09-28T14:35:13.561Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-identity-and-access-management-ciam-evolution.html</loc><lastmod>2025-02-19T21:05:42.364Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-solutions-in-age-of-ai.html</loc><lastmod>2023-09-27T17:58:25.929Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/mfa-bombing-dismantled.html</loc><lastmod>2023-11-09T19:11:32.999Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-google-chrome-enterprise.html</loc><lastmod>2023-10-11T19:43:27.66Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-privacy-and-consent-best-practices.html</loc><lastmod>2023-10-17T17:00:03.054Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/five-elements-threat-protection.html</loc><lastmod>2023-12-05T22:58:17.427Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-security-privacy-consent.html</loc><lastmod>2023-10-20T21:56:05.586Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/making-most-of-cloud-In-financial-services.html</loc><lastmod>2025-06-26T15:54:47.922Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/introducing-voice-verification.html</loc><lastmod>2023-10-27T20:21:29.863Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/continuous-adaptive-trust-final-frontier.html</loc><lastmod>2023-10-30T18:32:28.47Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-cloud-acceleration-toolset.html</loc><lastmod>2024-06-14T21:07:47.569Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ecommerce-fraud-detection.html</loc><lastmod>2023-11-20T21:24:24.585Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/shared-finance-empower-customers-identity-authorization.html</loc><lastmod>2023-12-01T20:19:50.841Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-leader-gartner-magic-quadrant-access-management.html</loc><lastmod>2023-12-15T16:47:59.771Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-leader-gartner-critical-capabilities-access-management-2023.html</loc><lastmod>2025-02-21T23:32:15.475Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/five-steps-operationalize-pingcentral.html</loc><lastmod>2024-01-02T21:14:45.135Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-youniverse-global-2023-recap.html</loc><lastmod>2024-01-23T22:19:02.474Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/digital-identity-financial-services.html</loc><lastmod>2024-05-06T20:34:04.976Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pekin-insurance-delivers-security.html</loc><lastmod>2024-08-12T20:34:11.271Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/financial-services-ciam-strategy.html</loc><lastmod>2024-09-11T17:40:00.653Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ecommerce-holiday-rush-preparation.html</loc><lastmod>2025-06-26T14:21:57.474Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/bernard-harguindeguy/page/1.html</loc><lastmod>2023-01-13T01:56:39.522Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/mark-dorey/page/1.html</loc><lastmod>2023-01-27T22:33:10.854Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/chris-price/page/1.html</loc><lastmod>2023-01-27T23:05:45.612Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anthony-dombrowski/page/1.html</loc><lastmod>2023-11-15T21:48:15.322Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/craig-solberg/page/1.html</loc><lastmod>2024-06-26T16:27:37.549Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/emily-mucklow/page/1.html</loc><lastmod>2023-01-27T22:56:09.312Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/rob-greenman/page/1.html</loc><lastmod>2023-01-26T23:52:26.454Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/philip-coldrey/page/1.html</loc><lastmod>2023-01-27T22:19:41.015Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/bryan-rosensteel/page/1.html</loc><lastmod>2023-01-27T23:10:06.657Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jeremy-carrier/page/1.html</loc><lastmod>2023-01-27T22:42:58.497Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/aaron-hughes/page/1.html</loc><lastmod>2023-01-27T23:18:17.638Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ido-amitay/page/1.html</loc><lastmod>2023-01-27T22:50:46.782Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/vikas-mundada-and-michael-sanchez/page/1.html</loc><lastmod>2025-09-17T21:51:23.843Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/arthur-loris/page/1.html</loc><lastmod>2023-01-27T23:12:12.039Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/matthew-mcnulty/page/1.html</loc><lastmod>2023-11-15T00:31:20.731Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/moshe-ben-noun/page/1.html</loc><lastmod>2023-01-27T00:33:08.799Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/wesley-dunnington/page/1.html</loc><lastmod>2023-02-17T23:28:15.311Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/shannon-lightfoot/page/1.html</loc><lastmod>2023-01-27T00:04:55.508Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jason-kees/page/1.html</loc><lastmod>2023-11-15T18:15:28.02Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/itai-zach/page/1.html</loc><lastmod>2023-01-27T22:49:55.19Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/pratibha-srikanta/page/1.html</loc><lastmod>2023-01-27T22:17:23.584Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ashley-diffey/page/1.html</loc><lastmod>2023-01-27T23:11:01.782Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andrew-goodman/page/1.html</loc><lastmod>2023-01-13T01:48:22.628Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andrew-morales/page/1.html</loc><lastmod>2023-01-27T23:16:48.815Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anthony-heninger/page/1.html</loc><lastmod>2023-01-27T23:12:57.12Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/baber-amin/page/1.html</loc><lastmod>2023-01-25T16:50:14.055Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/bjorn-aannestad/page/1.html</loc><lastmod>2023-01-25T16:53:12.277Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/brian-campbell/page/1.html</loc><lastmod>2023-01-27T23:10:08.557Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/cayla-curtis/page/1.html</loc><lastmod>2024-08-20T15:18:58.377Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/christine-bevilacqua/page/1.html</loc><lastmod>2023-01-13T01:59:27.376Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/curtis-muir/page/1.html</loc><lastmod>2023-01-27T23:04:11.877Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/darell-machado/page/1.html</loc><lastmod>2024-08-16T19:39:23.73Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/david-waite/page/1.html</loc><lastmod>2023-01-27T22:58:18.235Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/derick-james/page/1.html</loc><lastmod>2023-01-25T17:26:00.564Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/derick-townsend/page/1.html</loc><lastmod>2023-01-13T02:01:56.948Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/donna-shawhan/page/1.html</loc><lastmod>2023-01-13T02:06:21.763Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/dustin-maxey/page/1.html</loc><lastmod>2024-08-16T17:36:54.183Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/federico-carbone/page/1.html</loc><lastmod>2023-01-27T00:16:46.476Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/guoping-liu/page/1.html</loc><lastmod>2023-01-25T18:28:10.128Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jason-evans/page/1.html</loc><lastmod>2023-01-27T22:47:53.271Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jason-oeltjen/page/1.html</loc><lastmod>2023-01-26T23:30:10.502Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/kevin-sellers/page/1.html</loc><lastmod>2023-01-27T22:39:28.693Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/loren-russon/page/1.html</loc><lastmod>2023-01-27T00:27:31.821Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/marco-delas/page/1.html</loc><lastmod>2023-01-27T22:33:51.601Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/michael-sanchez/page/1.html</loc><lastmod>2023-01-26T23:23:53.922Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/michelle-jenkins/page/1.html</loc><lastmod>2023-11-15T00:26:55.839Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/natalie-blake/page/1.html</loc><lastmod>2023-01-19T22:52:24.749Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/natalie-woodard/page/1.html</loc><lastmod>2023-01-27T22:26:21.53Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/or-hay/page/1.html</loc><lastmod>2023-01-25T19:38:49.632Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/oren-sternheim/page/1.html</loc><lastmod>2023-01-25T19:47:44.456Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/patrick-harding/page/1.html</loc><lastmod>2023-01-27T22:21:32.792Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/paul-van-der-lee/page/1.html</loc><lastmod>2023-02-02T20:04:06.506Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/rob-otto/page/1.html</loc><lastmod>2023-01-27T22:15:13.457Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ryan-kogelheide/page/1.html</loc><lastmod>2023-02-02T20:03:45.529Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/saira-guthrie/page/1.html</loc><lastmod>2023-01-27T00:02:20.524Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jeremie-miller/page/1.html</loc><lastmod>2023-01-27T22:43:47.555Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/john-dasilva/page/1.html</loc><lastmod>2023-01-27T00:23:23.164Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/sascha-preibisch/page/1.html</loc><lastmod>2023-01-27T22:10:53.77Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/scott-tomilson/page/1.html</loc><lastmod>2023-01-25T20:40:13.815Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/tarun-madiraju/page/1.html</loc><lastmod>2023-01-25T20:44:12.987Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/diana-jouard/page/1.html</loc><lastmod>2023-01-27T22:56:56.464Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/zain-malik/page/1.html</loc><lastmod>2023-01-13T03:39:25.877Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/nicole-alrubaiy/page/1.html</loc><lastmod>2023-01-13T02:40:36.765Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andre-durand/page/1.html</loc><lastmod>2023-01-13T01:35:48.667Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/emily-mckeown/page/1.html</loc><lastmod>2023-01-13T02:10:26.352Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/matt-pollicove/page/1.html</loc><lastmod>2023-01-13T02:26:03.214Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/maya-ogranovitch-scott/page/1.html</loc><lastmod>2024-08-19T22:06:21.993Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/yev-koup/page/1.html</loc><lastmod>2023-11-14T19:36:07.331Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/joe-malenfant/page/1.html</loc><lastmod>2023-11-15T00:45:14.9Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andrew-hughes/page/1.html</loc><lastmod>2023-11-15T22:18:47.858Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/mehmet-yaliman/page/1.html</loc><lastmod>2023-01-13T02:30:04.496Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/edward-killeen/page/1.html</loc><lastmod>2023-01-13T02:09:08.927Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/philippe-de-ryck/page/1.html</loc><lastmod>2022-12-02T00:22:37.419Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jordan-griffith/page/1.html</loc><lastmod>2023-11-15T00:39:33.02Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/richard-bird/page/1.html</loc><lastmod>2023-02-02T20:02:23.095Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/steve-dillon/page/1.html</loc><lastmod>2023-01-20T15:45:21.299Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/matt-bates/page/1.html</loc><lastmod>2023-01-26T23:24:34.354Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/alasdair-rambaud/page/1.html</loc><lastmod>2023-01-13T01:49:32.777Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/stacy-gardner/page/1.html</loc><lastmod>2023-11-14T22:30:13.996Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/samuel-brown/page/1.html</loc><lastmod>2023-11-15T00:22:20.935Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/robert-broeckelmann/page/1.html</loc><lastmod>2023-01-26T23:54:32.895Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/armin-ebrahimi/page/1.html</loc><lastmod>2023-02-17T22:17:31.541Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/aubrey-turner/page/1.html</loc><lastmod>2023-11-15T19:28:07.804Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/divya-handa/page/1.html</loc><lastmod>2023-12-01T01:44:33.056Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/yariv-levavi/page/1.html</loc><lastmod>2023-01-27T00:11:19.872Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/adam-rusbridge/page/1.html</loc><lastmod>2024-08-20T18:21:52.737Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/george-lattimore/page/1.html</loc><lastmod>2023-01-13T02:13:25.087Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/mindy-servello/page/1.html</loc><lastmod>2023-01-13T02:36:36.528Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/aviad-maroodi/page/1.html</loc><lastmod>2023-11-15T19:02:03.532Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/joseph-dhanapal/page/1.html</loc><lastmod>2023-01-26T23:25:33.459Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ran-wasserman/page/1.html</loc><lastmod>2023-01-13T02:43:08.909Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/thomas-schneider/page/1.html</loc><lastmod>2023-11-14T22:21:19.011Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/branden-williams/page/1.html</loc><lastmod>2023-01-13T01:58:06.813Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/nicole-reichle/page/1.html</loc><lastmod>2023-01-13T02:39:00.628Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/fritz-mandlemeier/page/1.html</loc><lastmod>2023-01-13T02:11:34.494Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jens-keuter/page/1.html</loc><lastmod>2023-11-15T17:58:58.798Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/laurent-szpirglas/page/1.html</loc><lastmod>2023-11-15T00:35:30.647Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/alan-glickenhouse/page/1.html</loc><lastmod>2023-02-28T17:47:45.634Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anjelica-roman/page/1.html</loc><lastmod>2023-11-15T22:15:27.128Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/federico-carbone-and-vinny-sagar/page/1.html</loc><lastmod>2025-09-17T21:51:23.84Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/herb-goodfellow/page/1.html</loc><lastmod>2023-03-24T21:18:23.4Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/max-fathauer-and-herb-goodfellow/page/1.html</loc><lastmod>2025-09-17T21:51:23.84Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/sabrina-habbe/page/1.html</loc><lastmod>2023-05-05T16:59:03.384Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/louise-watson/page/1.html</loc><lastmod>2024-05-23T21:08:37.707Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/max-fathauer/page/1.html</loc><lastmod>2024-08-21T21:24:44.237Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/darrell-geusz/page/1.html</loc><lastmod>2023-11-13T19:17:47.434Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/adam-preis/page/1.html</loc><lastmod>2024-05-02T17:59:40.512Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/nicole-roseveare/page/1.html</loc><lastmod>2024-08-12T17:25:52.258Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anish-srivastava/page/1.html</loc><lastmod>2024-08-16T18:23:29.992Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/downloads.html</loc><lastmod>2023-12-14T16:06:54.024Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals.html</loc><lastmod>2024-01-02T16:56:03.479Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication.html</loc><lastmod>2023-05-03T20:37:15.976Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/single-factor-two-factor-multi-factor-authentication.html</loc><lastmod>2023-05-03T20:38:55.591Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/passwordless-authentication.html</loc><lastmod>2023-07-17T21:39:09.066Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/passwordless-authentication/fido.html</loc><lastmod>2025-02-25T15:08:58.05Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/risk-based-authentication.html</loc><lastmod>2023-05-03T21:07:29.746Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/certificate-authentication.html</loc><lastmod>2022-10-20T20:46:11.203Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/token-based-authentication.html</loc><lastmod>2023-05-03T21:19:19.666Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/single-sign-on.html</loc><lastmod>2023-05-03T21:20:55.761Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/federated-identity-management.html</loc><lastmod>2023-05-03T21:25:17.783Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/chap-authentication.html</loc><lastmod>2023-02-17T17:09:01.654Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/continuous-authentication.html</loc><lastmod>2023-05-03T21:29:11.122Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-orchestration.html</loc><lastmod>2025-07-08T19:11:26.398Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-and-access-management.html</loc><lastmod>2025-07-08T18:34:30.943Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-and-access-management/identity-providers-service-providers.html</loc><lastmod>2023-05-03T20:29:04.335Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-and-access-management/centralized-decentralized-identity-management.html</loc><lastmod>2022-09-21T17:06:31.218Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/zero-trust-security.html</loc><lastmod>2024-01-02T18:22:13.207Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards.html</loc><lastmod>2022-10-10T17:05:26.737Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards/oauth.html</loc><lastmod>2023-05-03T19:39:25.063Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards/openid-connect.html</loc><lastmod>2024-10-03T17:26:56.415Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards/saml.html</loc><lastmod>2023-05-03T20:04:25.268Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization.html</loc><lastmod>2023-05-03T21:30:45.892Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/authorization-methods.html</loc><lastmod>2023-12-19T22:38:01.531Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/user-account-provisioning.html</loc><lastmod>2022-10-20T20:46:13.515Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/sso-directory.html</loc><lastmod>2023-05-03T21:36:32.989Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/dynamic-authorization.html</loc><lastmod>2023-12-19T22:36:47.569Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols.html</loc><lastmod>2023-02-22T16:27:29.665Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/ldap.html</loc><lastmod>2023-05-03T17:46:05.183Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/scim.html</loc><lastmod>2023-05-04T16:03:10.768Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/webauthn.html</loc><lastmod>2023-05-04T16:21:57.57Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/kerberos.html</loc><lastmod>2023-05-04T16:52:22.744Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/ws-trust.html</loc><lastmod>2024-10-04T22:26:11.365Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/b2b-identity.html</loc><lastmod>2025-07-01T20:28:45.842Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/agentic-ai.html</loc><lastmod>2025-07-15T21:34:03.012Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management.html</loc><lastmod>2025-07-15T21:52:39.105Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management/what-is-centralized-identity-management.html</loc><lastmod>2025-07-16T14:24:04.48Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management/how-does-centralized-identity-management-work.html</loc><lastmod>2025-07-16T14:24:05.3Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards.html</loc><lastmod>2025-07-16T14:24:05.563Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library.html</loc><lastmod>2023-06-27T18:32:52.093Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/analyst-reports/3697-kuppingercole-leadership-compass-verified-identity.html</loc><lastmod>2023-01-25T17:18:30.011Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/analyst-reports/3710-kuppcole-reusable-verified-identity.html</loc><lastmod>2023-05-22T14:19:50.447Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/analyst-reports/3745-kuppingercole-leadership-compass-access-management.html</loc><lastmod>2023-09-20T23:13:05.295Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/analyst-reports/4003-kuppingercole-policy-based-access-management.html</loc><lastmod>2024-04-09T14:55:02.661Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/analyst-reports/3993-kuppingercole-leadership-compass-identity-fabrics.html</loc><lastmod>2024-04-08T23:29:16.93Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/articles.html</loc><lastmod>2022-04-18T15:33:02.697Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/articles/digital-transformation.html</loc><lastmod>2024-02-15T22:04:23.929Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/articles/authentication-authorization-web-api.html</loc><lastmod>2022-09-27T23:09:15.296Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/articles/secure-digital-identities.html</loc><lastmod>2022-09-27T23:08:14.239Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets.html</loc><lastmod>2022-04-18T15:33:03.504Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3427-pingone-advanced-services-datasheet.html</loc><lastmod>2023-03-24T17:31:28.555Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3511-adaptive-access-security.html</loc><lastmod>2024-01-22T19:19:13.144Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3012-pingaccess-datenblatt.html</loc><lastmod>2023-05-23T20:37:23.216Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3013-pingfederate-datenblatt.html</loc><lastmod>2023-03-24T16:15:46.657Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3027-pingid-technical-brief.html</loc><lastmod>2023-03-24T17:24:30.941Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3196-pingdirectory-datenblatt.html</loc><lastmod>2023-03-24T17:29:05.281Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3197-pingdatasync-datenblatt.html</loc><lastmod>2023-02-14T20:01:52.034Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3455-pingcentral.html</loc><lastmod>2023-03-24T17:32:03.614Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3503-pingone-workforce.html</loc><lastmod>2023-03-24T17:34:19.881Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3512-pingone-customers.html</loc><lastmod>2023-03-24T17:34:57.968Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3527-pingone-mfa.html</loc><lastmod>2023-03-24T17:38:06.395Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3553-pingone-verify.html</loc><lastmod>2023-11-27T17:22:02.581Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3014-pingid-datenblatt.html</loc><lastmod>2023-03-24T16:16:39.302Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3608-pingone-authorize.html</loc><lastmod>2023-03-24T17:44:27.202Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3611-pingone-davinci.html</loc><lastmod>2023-04-13T16:38:36.268Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3714-pingone-credentials.html</loc><lastmod>2023-04-25T17:12:18.12Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3718-pingone-protect.html</loc><lastmod>2023-06-27T18:33:22.564Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3732-pingone-customer-passwordless.html</loc><lastmod>2023-09-13T21:52:25.768Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/data-sheets/3742-pingintelligence-apis.html</loc><lastmod>2023-11-17T19:38:34.843Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks.html</loc><lastmod>2022-04-18T15:33:04.894Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3005-customer-engagement-starts-sso.html</loc><lastmod>2023-02-14T16:35:57.832Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3050-cios-guide-modern-identity.html</loc><lastmod>2024-03-21T14:36:13.898Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3055-security-by-design.html</loc><lastmod>2023-03-27T15:03:15.592Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3136-enterprise-cloud-iam.html</loc><lastmod>2023-03-27T15:03:34.615Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3241-psd2-open-banking-standard.html</loc><lastmod>2022-07-08T20:59:38.069Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3377-essential-guide-single-sign-on.html</loc><lastmod>2023-03-27T15:03:59.536Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3709-passwordless-paradox.html</loc><lastmod>2023-10-04T22:31:29.352Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3727-customer-experience-key-to-success-financial-services.html</loc><lastmod>2023-09-13T23:31:40.13Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3740-state-of-identity-2023.html</loc><lastmod>2023-10-26T23:22:04.147Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/ebooks/3752-key-trends-customer-experience-2024.html</loc><lastmod>2024-01-02T15:14:47.541Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/executive-briefs.html</loc><lastmod>2022-04-18T15:33:05.508Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/executive-briefs/3162-top-3-cmo-challenges.html</loc><lastmod>2023-03-27T15:05:05.648Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/executive-briefs/3164-balance-personalization-and-privacy.html</loc><lastmod>2023-03-27T15:05:30.917Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/executive-briefs/3684-ultimate-guide-ciam-executive-summary.html</loc><lastmod>2023-04-13T16:43:14.125Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides.html</loc><lastmod>2022-04-18T15:33:05.55Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3150-ultimate-guide-to-mfa.html</loc><lastmod>2022-04-18T15:33:05.601Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3210-security-leaders-guide-to-access-security.html</loc><lastmod>2022-04-18T15:33:05.681Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3218-security-leaders-guide-to-mfa.html</loc><lastmod>2023-03-27T15:24:44.867Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3406-it-directors-guide-mfa.html</loc><lastmod>2023-03-27T15:24:21.693Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/ultimate-guide-web-mobile-api-access.html</loc><lastmod>2022-04-18T15:33:05.91Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3573-speed-up-ciam-administration.html</loc><lastmod>2023-03-27T15:22:45.549Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3243-security-leaders-guide-zero-trust-model.html</loc><lastmod>2022-09-09T11:03:16.242Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3624-ultimate-guide-to-online-fraud-prevention.html</loc><lastmod>2022-11-01T23:39:37.887Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3555-customer-identity-buyers-guide.html</loc><lastmod>2023-07-13T15:58:10.28Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3632-ultimate-guide-to-orchestration.html</loc><lastmod>2023-03-27T15:22:12.15Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3576-cloud-identity-buyers-guide.html</loc><lastmod>2023-02-16T19:09:08.594Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3687-passwordless-journey.html</loc><lastmod>2023-04-05T15:53:06.97Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3708-improving-customer-experiences-identity-best-practices.html</loc><lastmod>2023-05-25T14:14:57.863Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/ultimate-guide-to-ciam.html</loc><lastmod>2023-06-05T14:36:21.76Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3706-customer-identity-buyers-guide-retailers.html</loc><lastmod>2023-06-14T17:31:10.869Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3725-how-identity-impacts-business.html</loc><lastmod>2023-08-04T14:18:25.736Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3209-security-leaders-guide-to-SSO.html</loc><lastmod>2023-09-19T23:14:40.347Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3737-security-leaders-guide-user-protection.html</loc><lastmod>2023-09-28T21:19:32.22Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/guides/3140-mfa-buyers-guide.html</loc><lastmod>2024-03-26T20:25:25.713Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/technical-briefs.html</loc><lastmod>2022-04-18T15:33:06.033Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/technical-briefs/3154-modernizing-legacy-directory-servers.html</loc><lastmod>2023-03-27T16:38:41.422Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/technical-briefs/3271-adaptive-authentication-and-authorization.html</loc><lastmod>2023-03-27T16:37:19.092Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/technical-briefs/3590-pingone-customers.html</loc><lastmod>2023-08-08T20:52:28.983Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/technical-briefs/3591-pingone-workforce.html</loc><lastmod>2023-08-08T20:52:29.901Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/technical-briefs/3731-pingone-customers-passwordless.html</loc><lastmod>2023-08-23T22:40:44.989Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs.html</loc><lastmod>2022-04-18T15:33:06.085Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3023-employee-solution-brief.html</loc><lastmod>2023-03-27T16:14:24.768Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3025-partner-solution-brief.html</loc><lastmod>2023-03-27T16:14:27.098Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3026-identity-defined-security.html</loc><lastmod>2023-03-27T16:14:36.102Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3144-customer-identity-and-access-management-solution.html</loc><lastmod>2023-03-27T16:14:34.437Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3256-gdpr-solutionbrief.html</loc><lastmod>2023-03-27T16:14:32.885Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3264-psd2-open-banking-compliance-competitive-edge.html</loc><lastmod>2023-03-27T16:14:31.258Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3304-iam-solutions-for-financial-services.html</loc><lastmod>2023-07-12T16:35:32.004Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3713-pingone-neo.html</loc><lastmod>2023-04-12T19:21:11.518Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/identity-access-management-retail-3320.html</loc><lastmod>2023-06-07T14:21:31.761Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3724-pingone-cloud-platform-deployment-options.html</loc><lastmod>2023-07-21T17:16:45.527Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3633-migrate-pingone-advanced-services.html</loc><lastmod>2023-08-04T14:46:40.297Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/solution-briefs/3622-Identity-orchestration.html</loc><lastmod>2023-08-04T22:15:07.624Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/lists/5-ways-to-boost-security.html</loc><lastmod>2022-04-18T15:33:06.233Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/lists/5-ways-to-boost-productivity.html</loc><lastmod>2022-04-18T15:33:06.344Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/lists/5-ways-to-boost-agility.html</loc><lastmod>2022-04-18T15:33:06.453Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/lists/5-ways-wfh-secure-productive.html</loc><lastmod>2022-07-06T15:19:48.824Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/lists/3578-3-steps-identity-in-cloud.html</loc><lastmod>2023-10-10T19:20:03.259Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/lists/3408-five-steps-zero-trust-access.html</loc><lastmod>2023-03-27T16:02:14.125Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/misc/3029-top-mfa-considerations.html</loc><lastmod>2023-03-27T16:02:12.508Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/misc/3568-survey-remote-work-fuels-zero-trust.html</loc><lastmod>2023-03-27T16:02:06.367Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/misc/3496-pingcloud-simplifies-iam.html</loc><lastmod>2023-01-10T20:51:58.675Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/misc/3698-2022-consumer-survey.html</loc><lastmod>2025-06-27T19:00:15.937Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/misc/3678-ciam-solutions-evaluation-criteria.html</loc><lastmod>2023-03-27T15:49:53.304Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/misc/3011-ping-corporate-brochure.html</loc><lastmod>2023-08-10T23:56:18.245Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/misc/3743-2023-consumer-survey-brand-loyalty-digital-economy.html</loc><lastmod>2023-11-13T16:40:12.72Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/webinars.html</loc><lastmod>2022-04-18T15:33:07.293Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/webinar-replays.html</loc><lastmod>2022-04-18T15:33:07.41Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/vielen-dank-opt-in.html</loc><lastmod>2025-08-22T15:50:04.911Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/infographics.html</loc><lastmod>2022-04-18T15:33:07.487Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/infographics/3567-identity-verification-whos-really-there.html</loc><lastmod>2023-03-27T15:44:11.105Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/infographics/3577-fight-fraud-dynamic-authorization.html</loc><lastmod>2023-03-27T15:43:22.727Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/infographics/3586-optimize-zero-trust-infrastructure.html</loc><lastmod>2023-03-27T15:42:58.362Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/infographics/3631-data-breaches-and-fraud-impact-brand-experience.html</loc><lastmod>2023-04-05T15:53:07.199Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/infographics/3634-customers-add-risk-signals-to-pingid.html</loc><lastmod>2023-04-10T19:08:03.132Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers.html</loc><lastmod>2022-04-18T15:33:07.86Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3028-getting-customer-iam-right.html</loc><lastmod>2023-03-27T16:49:34.086Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3042-saml-101.html</loc><lastmod>2023-03-27T16:49:08.497Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3127-openid-connect-101.html</loc><lastmod>2023-03-27T16:48:39.896Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3141-connect-apps-to-azure-ad-with-pingaccess.html</loc><lastmod>2023-03-27T16:48:01.932Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3200-business-drivers-of-user-managed-consent.html</loc><lastmod>2023-03-27T16:47:34.324Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3239-iam-pros-guide-to-building-a-business-case-part-2.html</loc><lastmod>2023-03-27T16:46:45.507Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3257-gdpr-opportunities-building-customer-trust-loyalty.html</loc><lastmod>2023-03-27T16:46:01.508Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3299-unified-approach-to-delivering-exceptional-customer-experiences.html</loc><lastmod>2022-04-18T15:33:08.931Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3352-evolving-api-security-landscape.html</loc><lastmod>2022-04-18T15:33:08.972Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3358-idaas-for-application-developers.html</loc><lastmod>2023-03-27T16:45:33.435Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3429-strengthen-your-api-security.html</loc><lastmod>2022-04-18T15:33:09.067Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3442-workforce-authentication-authority.html</loc><lastmod>2022-04-18T15:33:09.107Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3448-strengthen-financial-api-security.html</loc><lastmod>2022-04-18T15:33:09.146Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3502-adaptive-access-security.html</loc><lastmod>2022-04-18T15:33:09.355Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3571-protect-sensitive-data-dynamic-authorization.html</loc><lastmod>2023-03-27T16:44:37.733Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3601-behavioral-data-key-unlock-better-fraud-prevention.html</loc><lastmod>2023-03-27T16:44:05.022Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3626-retail-fraud.html</loc><lastmod>2023-03-27T16:43:25.384Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3001-mfa-best-practices-for-modern-digital-enterprise.html</loc><lastmod>2022-09-09T11:03:16.831Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3481-intelligent-identity.html</loc><lastmod>2022-09-09T11:03:15.945Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3452-ramp-up-security-productivity.html</loc><lastmod>2023-03-27T16:45:07.949Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3500-pingone-workforce-integrations-guide.html</loc><lastmod>2024-03-21T14:49:36.289Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3253-multi-factor-authentication-customers.html</loc><lastmod>2022-11-23T19:25:16.598Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3621-authentication-authority-pingfederate.html</loc><lastmod>2023-02-01T19:49:03.249Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3620-api-security-and-governance.html</loc><lastmod>2024-03-12T17:07:10.175Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3680-delivering-better-user-experiences-identity-orchestration.html</loc><lastmod>2023-03-13T14:46:36.218Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3498-customer-authentication-authority.html</loc><lastmod>2023-03-06T21:11:11.712Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3480-passwordless-authentication.html</loc><lastmod>2023-06-13T20:27:10.227Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3255-iam-pro-guide-3-consolidating-identities-with-a-modern-directory-solution.html</loc><lastmod>2023-07-10T15:39:41.365Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3730-kuppingercole-delivering-business-value-through-orchestration.html</loc><lastmod>2023-09-21T01:15:43.601Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/white-papers/3739-journey-to-zero-trust.html</loc><lastmod>2023-12-08T16:20:50.765Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals.html</loc><lastmod>2024-01-16T23:30:41.707Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats.html</loc><lastmod>2024-01-16T23:16:43.127Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/clickjacking.html</loc><lastmod>2024-01-16T23:35:50.95Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/cross-site-scripting.html</loc><lastmod>2024-01-16T23:47:38.803Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/internet-of-things-attack.html</loc><lastmod>2024-01-16T23:11:02.278Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/botnet-attack.html</loc><lastmod>2024-03-12T17:56:51.197Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/credential-stuffing.html</loc><lastmod>2023-11-02T19:10:08.991Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/ransomware-as-a-service-raas.html</loc><lastmod>2024-01-16T23:58:34.94Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/buffer-overflow-attack.html</loc><lastmod>2022-11-03T14:20:27.341Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/rootkit.html</loc><lastmod>2023-12-19T22:40:10.219Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/distributed-denial-of-service-ddos-attack.html</loc><lastmod>2022-11-03T14:20:29.024Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/keylogger.html</loc><lastmod>2024-01-16T23:55:49.333Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/sql-injection.html</loc><lastmod>2024-01-16T23:54:33.259Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/man-in-the-middle-attack.html</loc><lastmod>2023-02-16T19:49:02.526Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/zero-day-exploit.html</loc><lastmod>2023-02-16T19:49:02.981Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk.html</loc><lastmod>2024-01-16T23:24:52.31Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk/fraudulent-device-detection.html</loc><lastmod>2024-01-16T23:28:25.114Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk/soar.html</loc><lastmod>2025-07-01T20:12:54.927Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk/impossible-travel-101.html</loc><lastmod>2025-07-10T22:56:26.333Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/mitigate-risk.html</loc><lastmod>2024-01-16T20:47:28.524Z</lastmod></url><url><loc>https://www.pingidentity.com/de/ultimate-guides/identity-defined-security.html</loc><lastmod>2022-03-24T14:13:29.614Z</lastmod></url><url><loc>https://www.pingidentity.com/de/ultimate-guides/ultimate-guide-mfa/benefits-of-adaptive-mfa.html</loc><lastmod>2024-02-15T20:44:28.391Z</lastmod></url><url><loc>https://www.pingidentity.com/de/ultimate-guides/ultimate-guide-mfa/use-cases-for-adaptive-mfa.html</loc><lastmod>2025-06-09T14:39:16.376Z</lastmod></url><url><loc>https://www.pingidentity.com/de/ultimate-guides/ultimate-guide-mfa/how-adaptive-mfa-works.html</loc><lastmod>2025-06-09T14:39:22.349Z</lastmod></url><url><loc>https://www.pingidentity.com/de/ultimate-guides/ultimate-guide-mfa/conclusion.html</loc><lastmod>2025-06-09T14:39:16.736Z</lastmod></url><url><loc>https://www.pingidentity.com/de/search-results.html</loc><lastmod>2022-03-24T14:17:39.3Z</lastmod></url><url><loc>https://www.pingidentity.com/de/ty.html</loc><lastmod>2022-01-28T16:02:09.27Z</lastmod></url><url><loc>https://www.pingidentity.com/de/events/art-of-the-possible.html</loc><lastmod>2023-10-19T14:24:54.572Z</lastmod></url><url><loc>https://www.pingidentity.com/de/events/it-sa-expo-congress.html</loc><lastmod>2024-09-10T14:15:31.001Z</lastmod></url><url><loc>https://www.pingidentity.com/de/legal/gdpr-compliance-faq.html</loc><lastmod>2024-11-18T17:58:11.777Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability.html</loc><lastmod>2025-09-26T18:12:13.186Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/authentication-authority.html</loc><lastmod>2025-05-06T19:05:03.985Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/directory.html</loc><lastmod>2025-05-23T20:26:45.064Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-verification.html</loc><lastmod>2025-05-06T19:05:06.888Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/multi-factor-authentication.html</loc><lastmod>2025-07-18T19:40:02.362Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-orchestration.html</loc><lastmod>2025-05-06T19:05:08.591Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/personal-identity.html</loc><lastmod>2025-06-09T22:01:53.974Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/single-sign-on.html</loc><lastmod>2025-05-06T19:05:10.041Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/administration.html</loc><lastmod>2025-05-06T19:05:11.205Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-federation-hub.html</loc><lastmod>2025-05-06T19:05:11.547Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/pingone-credentials.html</loc><lastmod>2025-05-06T19:05:11.861Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/threat-protection.html</loc><lastmod>2025-06-27T18:26:57.703Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/authorization.html</loc><lastmod>2025-05-06T19:05:13.317Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-management.html</loc><lastmod>2025-05-06T19:05:14.236Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-governance.html</loc><lastmod>2025-06-25T20:22:14.29Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-cloud-security.html</loc><lastmod>2025-05-06T19:05:15.169Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/ai.html</loc><lastmod>2025-06-27T18:39:53.634Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/edge-security.html</loc><lastmod>2025-05-06T19:05:16.814Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/verifiable-credentials.html</loc><lastmod>2025-05-06T19:05:17.152Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/lifecycle-management.html</loc><lastmod>2025-05-06T19:05:18.914Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/jit-privileged-access.html</loc><lastmod>2025-09-30T14:29:31.6Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry.html</loc><lastmod>2025-05-06T19:05:19.209Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/financial-services.html</loc><lastmod>2025-05-06T19:05:19.605Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/healthcare.html</loc><lastmod>2025-05-06T19:05:20.757Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/manufacturing.html</loc><lastmod>2025-05-06T19:05:23.049Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/retail.html</loc><lastmod>2025-05-06T19:05:23.886Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/media-telco.html</loc><lastmod>2025-05-06T19:05:25.377Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/automotive.html</loc><lastmod>2025-05-06T19:05:26.685Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/insurance.html</loc><lastmod>2025-05-06T19:05:28.218Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-authorize.html</loc><lastmod>2025-05-06T19:05:29.004Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-mfa.html</loc><lastmod>2025-05-06T19:05:29.877Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-davinci.html</loc><lastmod>2025-09-17T21:29:08.971Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-verify.html</loc><lastmod>2025-09-26T18:12:13.183Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingauthorize.html</loc><lastmod>2025-05-06T19:05:32.516Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingaccess.html</loc><lastmod>2025-05-06T19:05:33.588Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pinggateway.html</loc><lastmod>2025-05-06T19:05:34.531Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pinggateway/capability.html</loc><lastmod>2025-05-06T19:05:35.091Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingcentral.html</loc><lastmod>2025-05-06T19:05:35.341Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingfederate.html</loc><lastmod>2025-05-06T19:05:36.098Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingid.html</loc><lastmod>2025-05-06T19:05:36.926Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-protect.html</loc><lastmod>2025-05-06T19:05:37.79Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingdirectory.html</loc><lastmod>2025-05-06T19:05:38.833Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-credentials.html</loc><lastmod>2025-05-06T19:05:39.72Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution.html</loc><lastmod>2025-09-03T15:27:00.049Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/mergers-acquisitions.html</loc><lastmod>2025-05-06T19:05:41.513Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/engage-your-customers.html</loc><lastmod>2025-05-06T19:05:42.111Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/prevent-online-fraud.html</loc><lastmod>2025-06-26T15:48:13.145Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/drive-compliance.html</loc><lastmod>2025-05-06T19:05:43.682Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/passwordless.html</loc><lastmod>2025-09-08T15:24:26.141Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/innovate-digital-experiences.html</loc><lastmod>2025-06-26T15:21:33.614Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/iam-modernization.html</loc><lastmod>2025-05-06T19:05:46.001Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/privacy-consent.html</loc><lastmod>2025-05-06T19:05:46.826Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/zero-trust.html</loc><lastmod>2025-05-06T19:05:47.608Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/iot.html</loc><lastmod>2025-05-06T19:05:48.665Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/workforce-identity.html</loc><lastmod>2025-09-08T14:53:11.428Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/b2b-identity.html</loc><lastmod>2025-08-27T23:18:36.864Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/cloud-identity.html</loc><lastmod>2025-06-25T21:09:03.016Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/agentic-ai-identity.html</loc><lastmod>2025-09-17T18:16:59.999Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/decentralized-identity.html</loc><lastmod>2025-09-29T16:02:01.26Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/api-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/industry-standards/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/customer-partner/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/customer-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/developers/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/events/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/identity-101/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/iam-modernization/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/identity-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/mfa/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/ping-news/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/passwordless/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/products-support/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/regulations-compliance/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/sso/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/workforce-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/zero-trust/page/1.html</loc></url></urlset>