<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9"><url><loc>https://www.pingidentity.com/de.html</loc><lastmod>2026-02-25T19:14:03.044Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform.html</loc><lastmod>2026-02-06T20:58:31.538Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/solutions.html</loc><lastmod>2023-05-03T17:05:39.935Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/solutions/partner.html</loc><lastmod>2022-10-19T17:28:51.549Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pricing.html</loc><lastmod>2026-01-27T20:02:54.64Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/deployment-options.html</loc><lastmod>2026-02-10T21:04:42.193Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/autonomous-identity.html</loc><lastmod>2024-11-08T20:54:17.591Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/software-development-kits.html</loc><lastmod>2025-02-21T23:11:51.772Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-advanced-identity-cloud.html</loc><lastmod>2025-12-26T22:50:45.462Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-advanced-identity-cloud-architecture.html</loc><lastmod>2024-05-30T22:13:51.279Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/identity-relationship-visualization.html</loc><lastmod>2024-05-10T16:21:20.059Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-for-customers.html</loc><lastmod>2026-03-03T23:41:58.248Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-for-workforce.html</loc><lastmod>2025-05-06T19:05:02.222Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/pingone-advanced-services.html</loc><lastmod>2025-08-11T21:29:06.669Z</lastmod></url><url><loc>https://www.pingidentity.com/de/platform/cloud-containerization.html</loc><lastmod>2025-07-11T16:08:51.878Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories.html</loc><lastmod>2024-12-05T14:55:37.249Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories/3712-raiffeisen-bank-international.html</loc><lastmod>2026-04-08T20:23:42.99Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories/3604-fluent-commerce.html</loc><lastmod>2026-04-14T17:44:34.487Z</lastmod></url><url><loc>https://www.pingidentity.com/de/customer-stories/3615-flinks.html</loc><lastmod>2026-04-14T17:40:58.676Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company.html</loc><lastmod>2026-04-11T16:29:04.503Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/upcoming-events.html</loc><lastmod>2026-03-19T17:49:17.844Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/about-us.html</loc><lastmod>2026-04-20T18:48:11.033Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/security-at-ping-identity.html</loc><lastmod>2022-04-11T00:27:22.651Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/security-at-ping-identity/form-unavailable.html</loc><lastmod>2022-01-28T16:29:30.801Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/leadership.html</loc><lastmod>2025-12-30T18:13:47.453Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/championing-every-identity.html</loc><lastmod>2024-12-06T18:06:59.785Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/championing-every-identity/esg.html</loc><lastmod>2024-12-06T18:12:58.176Z</lastmod></url><url><loc>https://www.pingidentity.com/de/company/championing-every-identity/dei.html</loc><lastmod>2024-10-08T18:49:05.354Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp.html</loc><lastmod>2022-02-08T23:09:34.211Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center.html</loc><lastmod>2022-02-08T23:09:44.462Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center-thank-you.html</loc><lastmod>2022-02-08T23:09:44.848Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center-request.html</loc><lastmod>2022-02-08T23:09:45.167Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/preference-center-request-thank-you.html</loc><lastmod>2022-02-08T23:09:45.567Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo.html</loc><lastmod>2025-06-30T15:12:09.207Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/neo.html</loc><lastmod>2023-04-12T19:22:11.562Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/credentialing.html</loc><lastmod>2023-10-23T17:38:13.306Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/verification.html</loc><lastmod>2023-04-25T16:58:49.085Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/integrations.html</loc><lastmod>2023-04-24T17:30:16.57Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pingone-neo/decentralized-identity-101.html</loc><lastmod>2025-01-16T17:14:48.511Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ac/pinghelix.html</loc><lastmod>2026-01-07T16:20:40.179Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/customer-identity-access-management-landscape.html</loc><lastmod>2024-12-05T15:15:54.308Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/pingandforgerock.html</loc><lastmod>2026-04-08T19:47:52.079Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4076-2024-consumer-survey-improved-digital-experiences.html</loc><lastmod>2025-11-17T20:41:39.145Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/p.html</loc><lastmod>2024-10-25T14:27:59.31Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/p/aws.html</loc><lastmod>2024-11-04T23:02:18.482Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4099-how-leading-brands-stop-fraud-prevent-threats.html</loc><lastmod>2025-10-08T22:40:02.2Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4098-stop-identity-fraud.html</loc><lastmod>2025-10-08T22:39:55.126Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4101-reduce-new-account-fraud-risks.html</loc><lastmod>2025-10-08T22:40:10.194Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4102-align-tech-business-drive-transformation.html</loc><lastmod>2025-10-08T22:40:26.237Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4103-fraud-prevention-ciam-checklist.html</loc><lastmod>2025-10-08T22:40:33.251Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4105-account-takeover-prevention.html</loc><lastmod>2025-10-08T22:40:52.338Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4107-keeping-out-fraudsters.html</loc><lastmod>2025-10-08T22:41:08.347Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4108-identity-new-account-fraud.html</loc><lastmod>2025-10-22T21:36:37.244Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/4110-10-must-have-ciam-capabilities.html</loc><lastmod>2025-10-22T21:43:16.419Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/trust-every-digital-moment.html</loc><lastmod>2026-01-30T22:36:16.375Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/ciam-landscape.html</loc><lastmod>2025-12-09T18:06:06.272Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/choose-ping-identity-over-onelogin.html</loc><lastmod>2025-12-16T17:26:28.096Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/choose-ping-identity-over-duo.html</loc><lastmod>2025-12-16T17:30:55.672Z</lastmod></url><url><loc>https://www.pingidentity.com/de/lp/universal-services.html</loc><lastmod>2026-03-13T14:39:05.515Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources.html</loc><lastmod>2023-05-11T14:30:42.932Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog.html</loc><lastmod>2023-04-05T14:22:06.232Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/posts.html</loc><lastmod>2022-04-18T15:32:56.823Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/jwt-security-nobody-talks-about.html</loc><lastmod>2024-10-08T15:38:38.726Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/simple-open-banking-payments-decoupled-authentication.html</loc><lastmod>2023-09-21T23:41:46.996Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-cybercriminals-dont-want-you-to-know-about-sso.html</loc><lastmod>2026-02-03T20:15:36.095Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pingdatagovernance-securing-customer-data.html</loc><lastmod>2026-01-26T18:33:51.099Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/build-buy-strong-case-buying-ciam-solution.html</loc><lastmod>2024-03-18T18:01:21.971Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/risk-based-authentication-integrations.html</loc><lastmod>2024-11-18T18:05:02.726Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/evaluate-identity-integrations.html</loc><lastmod>2025-12-08T23:38:21.23Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/strong-performer-forrester-wave-ciam.html</loc><lastmod>2026-04-08T00:32:17.438Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/intelligent-workforce-authentication-decisions.html</loc><lastmod>2023-10-19T17:06:30.762Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/remote-work-zero-trust.html</loc><lastmod>2024-03-12T18:04:04.467Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/three-breaches-zero-trust-could-have-been-prevented.html</loc><lastmod>2024-03-12T18:07:45.844Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/workforce-identity-can-ensure-digital-transformation-success.html</loc><lastmod>2024-03-20T18:26:04.316Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/zoom-zscaler-ping-integrations-secure-work-from-home.html</loc><lastmod>2023-10-19T20:08:25.197Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/5-authentication-experiences-drive-customers-away-cost-revenue.html</loc><lastmod>2023-12-14T16:22:19.523Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/work-from-home-how-to-keep-employees-productive-secure.html</loc><lastmod>2025-12-16T17:38:09.625Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/data-privacy-consent-building-strong-customer-relationships.html</loc><lastmod>2023-10-19T20:09:19.719Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-does-passwordless-really-mean.html</loc><lastmod>2024-02-15T20:18:33.45Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/refresh-token-rotation-spa.html</loc><lastmod>2023-01-24T21:17:47.572Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/top-benefits-sso.html</loc><lastmod>2024-01-30T23:13:52.952Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/eight-benefits-mfa.html</loc><lastmod>2024-03-12T18:22:19.272Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/one-time-password-ultimate-guide.html</loc><lastmod>2024-10-04T21:49:41.497Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ultimate-guide-token-based-authentication.html</loc><lastmod>2024-06-19T16:07:22.025Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/account-takeover-ato-fraud.html</loc><lastmod>2024-03-12T20:15:16.702Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-web-access-management-wam.html</loc><lastmod>2025-02-21T22:41:18.576Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/personal-identity-future-digital-interactions.html</loc><lastmod>2025-06-09T21:59:41.633Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/iam-security-overview.html</loc><lastmod>2024-03-12T20:18:42.815Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/authentication-vs-authorization.html</loc><lastmod>2025-12-21T12:36:58.366Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping4good-planting-trees.html</loc><lastmod>2023-01-24T22:45:19.548Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/securing-next-generation-workforce.html</loc><lastmod>2024-11-18T18:29:03.257Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ciam-better-digital-experiences.html</loc><lastmod>2023-09-26T16:04:28.994Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ultimate-guide-authentication.html</loc><lastmod>2026-04-11T16:06:48.549Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/everything-need-know-online-fraud.html</loc><lastmod>2025-06-09T22:17:54.001Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/thomas-schneider-productive-employees-sso.html</loc><lastmod>2026-02-03T20:18:31.598Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/provide-best-authentication-experience.html</loc><lastmod>2026-04-09T18:00:51.719Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/you-need-iam-mdm-in-todays-wfa-world.html</loc><lastmod>2024-10-29T14:47:24.293Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/hybrid-cloud-identity-2021.html</loc><lastmod>2026-01-29T19:00:18.203Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/getting-started-with-zero-trust.html</loc><lastmod>2026-01-29T18:58:58.121Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/dynamic-authorization.html</loc><lastmod>2023-09-26T21:36:04.901Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pingidentity-now-in-AWS-marketplace.html</loc><lastmod>2023-09-27T22:36:06.377Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/sso-vs-federated-identity-management.html</loc><lastmod>2024-03-20T18:23:09.955Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/engage-customers-identity-verification.html</loc><lastmod>2023-10-10T22:29:28.21Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/top-6-identity-industry-predictions-2021.html</loc><lastmod>2023-10-19T17:04:57.81Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/counter-fraud-strategy.html</loc><lastmod>2023-01-24T23:01:05.118Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-privileged-account-management-pam.html</loc><lastmod>2024-01-25T20:30:25.417Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-best-of-breed-technology.html</loc><lastmod>2023-11-02T19:45:07.949Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/prevent-account-takeover-ato-fraud-banking-financial-services.html</loc><lastmod>2025-12-17T19:59:01.858Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/3-ways-fin-serv-enterprise-architects-embrace-dynamic-auth.html</loc><lastmod>2025-12-16T15:51:27.611Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/encryption-vs-hashing-vs-salting.html</loc><lastmod>2023-11-01T21:56:04.578Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/api-security-zombie-apis.html</loc><lastmod>2023-08-24T19:19:48.82Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identification-vs-verification-vs-authentication.html</loc><lastmod>2023-11-02T16:39:54.384Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-online-fraud-monitoring.html</loc><lastmod>2023-11-02T19:38:08.423Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/preventing-data-breaches-with-iam.html</loc><lastmod>2026-01-29T18:55:04.455Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/top-ciam-benefits-financial-services.html</loc><lastmod>2025-02-19T20:53:24.837Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ecommerce-boom-iam.html</loc><lastmod>2023-01-24T23:10:53.683Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/barrierfree-secure-customer-experience.html</loc><lastmod>2025-02-19T20:54:48.336Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/girls-day-germany.html</loc><lastmod>2023-01-24T23:17:10.961Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/complete-guide-to-api-security.html</loc><lastmod>2024-10-04T21:24:45.663Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/how-big-is-the-cloud.html</loc><lastmod>2024-02-15T16:31:58.113Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-knowledge-based-authentication-kba.html</loc><lastmod>2023-11-02T17:03:44.263Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-out-of-band-authentication-ooba.html</loc><lastmod>2023-11-02T18:54:35.506Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-principle-of-least-privilege-polp.html</loc><lastmod>2026-04-08T00:42:43.385Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-sms-authentication.html</loc><lastmod>2023-11-02T16:54:41.854Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/oauth-vs-openid-connect.html</loc><lastmod>2023-11-01T18:11:44.206Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/best-identity-and-access-management-iam-tools.html</loc><lastmod>2024-03-12T18:32:05.839Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/rbac-vs-abac.html</loc><lastmod>2023-12-19T21:28:11.387Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/insurance-industry-iam-solutions.html</loc><lastmod>2024-03-12T20:20:35.216Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-governance-administration.html</loc><lastmod>2024-03-12T20:32:04.682Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-proofing-access-management-fraud-detection-convergence.html</loc><lastmod>2023-12-19T21:36:07.591Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-brute-force-attack.html</loc><lastmod>2026-03-10T17:11:42.206Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ransomware-detection-and-prevention.html</loc><lastmod>2024-03-12T18:10:38.115Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/password-future.html</loc><lastmod>2023-01-24T23:37:52.513Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/detect-and-prevent-website-bots.html</loc><lastmod>2023-12-19T21:38:29.469Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-progressive-profiling.html</loc><lastmod>2026-04-07T20:10:52.244Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/international-womens-day-helps-break-the-bias-all-year.html</loc><lastmod>2023-01-24T23:48:28.498Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/dynamic-authorization-role-fraud-prevention.html</loc><lastmod>2025-12-16T17:14:24.98Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-account-creation-fraud.html</loc><lastmod>2023-02-02T23:33:19.959Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/online-fraud-monitoring-facets.html</loc><lastmod>2023-01-24T23:58:18.724Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-to-know-about-passwordless-authentication.html</loc><lastmod>2023-02-02T23:33:22.263Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/how-ai-changes-cybersecurity.html</loc><lastmod>2024-04-01T13:02:33.021Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-microsoft-workday-digital-credential-verification-software.html</loc><lastmod>2024-03-20T19:31:45.431Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/cybersecurity-awareness-best-practices.html</loc><lastmod>2023-01-25T00:00:44.868Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pingone-davinci-technology-partner.html</loc><lastmod>2023-12-19T21:32:20.845Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2022-forrester-wave-ciam-leader.html</loc><lastmod>2023-12-19T22:20:57.141Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-orchestration-accelerates-passwordless-vision.html</loc><lastmod>2024-11-09T04:41:25.572Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2022-leader-gartner-iam-magic-quadrant.html</loc><lastmod>2025-12-08T23:32:04.615Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-youniverse-london-2022-recap.html</loc><lastmod>2023-03-09T19:17:21.045Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ultimate-guide-to-retail-customer-identity.html</loc><lastmod>2023-02-22T20:39:23.555Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/use-identity-to-give-customers-what-they-want.html</loc><lastmod>2026-04-07T20:10:10.294Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/build-or-buy-customer-identity-solutions.html</loc><lastmod>2024-03-28T21:25:36.723Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-identity-business-case-build.html</loc><lastmod>2026-04-07T20:05:19.739Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ciam-trends.html</loc><lastmod>2026-04-07T20:10:46.269Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/authorized-push-payment-fraud.html</loc><lastmod>2023-04-26T22:08:23.308Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2022-kuppingercole-leadership-compass-ciam-platforms.html</loc><lastmod>2025-02-21T22:09:46.21Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-cloud-capital-one.html</loc><lastmod>2024-11-04T20:36:01.257Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/fraud-decisioning-orchestration.html</loc><lastmod>2025-02-03T18:48:05.973Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/how-fido-passkeys-accelerate-passwordless-future.html</loc><lastmod>2023-03-06T16:29:33.53Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/grow-your-enterprise-securely-in-the-metaverse.html</loc><lastmod>2023-09-25T22:58:24.555Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/securely-using-oidc-authorization-code-flow-public-client-single-page-apps.html</loc><lastmod>2024-01-30T21:26:04.931Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping4good-helps-restore-rwandas-forests.html</loc><lastmod>2023-02-28T21:33:11.17Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ciam-survey-takeaways.html</loc><lastmod>2025-06-09T21:57:07.18Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/protect-financial-apis-manage-supply-chain-risk.html</loc><lastmod>2025-12-15T20:11:18.138Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/announcing-pingone-neo-decentralized-identity.html</loc><lastmod>2023-11-13T19:38:17.16Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/zero-trust-financial-services.html</loc><lastmod>2026-01-27T19:37:32.257Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/2023-girls-day-germany.html</loc><lastmod>2026-04-07T23:54:14.376Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/three-trends-identity-management-day.html</loc><lastmod>2023-06-16T20:53:55.816Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/passwordless-in-security-it-leader-self-help-guide.html</loc><lastmod>2026-01-29T20:05:11.885Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/balancing-cost-security-and-experience-with-identity-orchestration.html</loc><lastmod>2023-06-28T18:43:58.998Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/what-is-customer-identity-and-access-management-ciam.html</loc><lastmod>2026-04-06T17:17:59.231Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/financial-services-identity-verification.html</loc><lastmod>2026-04-07T22:43:50.382Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/helping-hands-ping-day-of-giving-back.html</loc><lastmod>2023-08-11T16:10:12.213Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/flexible-iam-deployment-options.html</loc><lastmod>2023-08-18T14:54:40.283Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/introducing-pingone-for-customers-passwordless-solution.html</loc><lastmod>2023-09-28T14:35:13.561Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-identity-and-access-management-ciam-evolution.html</loc><lastmod>2026-04-07T21:48:39.137Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/identity-solutions-in-age-of-ai.html</loc><lastmod>2023-09-27T17:58:25.929Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/mfa-bombing-dismantled.html</loc><lastmod>2023-11-09T19:11:32.999Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-google-chrome-enterprise.html</loc><lastmod>2023-10-11T19:43:27.66Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-privacy-and-consent-best-practices.html</loc><lastmod>2023-10-17T17:00:03.054Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/five-elements-threat-protection.html</loc><lastmod>2023-12-05T22:58:17.427Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/customer-security-privacy-consent.html</loc><lastmod>2023-10-20T21:56:05.586Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/making-most-of-cloud-In-financial-services.html</loc><lastmod>2025-06-26T15:54:47.922Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/introducing-voice-verification.html</loc><lastmod>2023-10-27T20:21:29.863Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/continuous-adaptive-trust-final-frontier.html</loc><lastmod>2023-10-30T18:32:28.47Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-cloud-acceleration-toolset.html</loc><lastmod>2024-06-14T21:07:47.569Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ecommerce-fraud-detection.html</loc><lastmod>2023-11-20T21:24:24.585Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/shared-finance-empower-customers-identity-authorization.html</loc><lastmod>2023-12-01T20:19:50.841Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-leader-gartner-magic-quadrant-access-management.html</loc><lastmod>2025-12-08T23:33:40.754Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-identity-leader-gartner-critical-capabilities-access-management-2023.html</loc><lastmod>2025-02-21T23:32:15.475Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/five-steps-operationalize-pingcentral.html</loc><lastmod>2024-01-02T21:14:45.135Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ping-youniverse-global-2023-recap.html</loc><lastmod>2024-01-23T22:19:02.474Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/digital-identity-financial-services.html</loc><lastmod>2024-05-06T20:34:04.976Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/pekin-insurance-delivers-security.html</loc><lastmod>2024-08-12T20:34:11.271Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/financial-services-ciam-strategy.html</loc><lastmod>2026-01-07T16:26:23.679Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/post/ecommerce-holiday-rush-preparation.html</loc><lastmod>2025-06-26T14:21:57.474Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/bernard-harguindeguy/page/1.html</loc><lastmod>2023-01-13T01:56:39.522Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/mark-dorey/page/1.html</loc><lastmod>2023-01-27T22:33:10.854Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/chris-price/page/1.html</loc><lastmod>2023-01-27T23:05:45.612Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anthony-dombrowski/page/1.html</loc><lastmod>2023-11-15T21:48:15.322Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/craig-solberg/page/1.html</loc><lastmod>2024-06-26T16:27:37.549Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/emily-mucklow/page/1.html</loc><lastmod>2023-01-27T22:56:09.312Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/rob-greenman/page/1.html</loc><lastmod>2023-01-26T23:52:26.454Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/philip-coldrey/page/1.html</loc><lastmod>2023-01-27T22:19:41.015Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/bryan-rosensteel/page/1.html</loc><lastmod>2023-01-27T23:10:06.657Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jeremy-carrier/page/1.html</loc><lastmod>2023-01-27T22:42:58.497Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/aaron-hughes/page/1.html</loc><lastmod>2023-01-27T23:18:17.638Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ido-amitay/page/1.html</loc><lastmod>2023-01-27T22:50:46.782Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/vikas-mundada-and-michael-sanchez/page/1.html</loc><lastmod>2025-09-17T21:51:23.843Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/arthur-loris/page/1.html</loc><lastmod>2023-01-27T23:12:12.039Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/matthew-mcnulty/page/1.html</loc><lastmod>2023-11-15T00:31:20.731Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/moshe-ben-noun/page/1.html</loc><lastmod>2023-01-27T00:33:08.799Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/wesley-dunnington/page/1.html</loc><lastmod>2023-02-17T23:28:15.311Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/shannon-lightfoot/page/1.html</loc><lastmod>2023-01-27T00:04:55.508Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jason-kees/page/1.html</loc><lastmod>2023-11-15T18:15:28.02Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/itai-zach/page/1.html</loc><lastmod>2023-01-27T22:49:55.19Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/pratibha-srikanta/page/1.html</loc><lastmod>2023-01-27T22:17:23.584Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ashley-diffey/page/1.html</loc><lastmod>2023-01-27T23:11:01.782Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andrew-goodman/page/1.html</loc><lastmod>2023-01-13T01:48:22.628Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andrew-morales/page/1.html</loc><lastmod>2023-01-27T23:16:48.815Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anthony-heninger/page/1.html</loc><lastmod>2023-01-27T23:12:57.12Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/baber-amin/page/1.html</loc><lastmod>2023-01-25T16:50:14.055Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/bjorn-aannestad/page/1.html</loc><lastmod>2023-01-25T16:53:12.277Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/brian-campbell/page/1.html</loc><lastmod>2023-01-27T23:10:08.557Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/cayla-curtis/page/1.html</loc><lastmod>2024-08-20T15:18:58.377Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/christine-bevilacqua/page/1.html</loc><lastmod>2023-01-13T01:59:27.376Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/curtis-muir/page/1.html</loc><lastmod>2023-01-27T23:04:11.877Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/darell-machado/page/1.html</loc><lastmod>2024-08-16T19:39:23.73Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/david-waite/page/1.html</loc><lastmod>2023-01-27T22:58:18.235Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/derick-james/page/1.html</loc><lastmod>2023-01-25T17:26:00.564Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/derick-townsend/page/1.html</loc><lastmod>2023-01-13T02:01:56.948Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/donna-shawhan/page/1.html</loc><lastmod>2023-01-13T02:06:21.763Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/dustin-maxey/page/1.html</loc><lastmod>2024-08-16T17:36:54.183Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/federico-carbone/page/1.html</loc><lastmod>2023-01-27T00:16:46.476Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/guoping-liu/page/1.html</loc><lastmod>2023-01-25T18:28:10.128Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jason-evans/page/1.html</loc><lastmod>2023-01-27T22:47:53.271Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jason-oeltjen/page/1.html</loc><lastmod>2023-01-26T23:30:10.502Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/kevin-sellers/page/1.html</loc><lastmod>2023-01-27T22:39:28.693Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/loren-russon/page/1.html</loc><lastmod>2023-01-27T00:27:31.821Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/marco-delas/page/1.html</loc><lastmod>2023-01-27T22:33:51.601Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/michael-sanchez/page/1.html</loc><lastmod>2023-01-26T23:23:53.922Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/michelle-jenkins/page/1.html</loc><lastmod>2023-11-15T00:26:55.839Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/natalie-blake/page/1.html</loc><lastmod>2023-01-19T22:52:24.749Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/natalie-woodard/page/1.html</loc><lastmod>2023-01-27T22:26:21.53Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/or-hay/page/1.html</loc><lastmod>2023-01-25T19:38:49.632Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/oren-sternheim/page/1.html</loc><lastmod>2023-01-25T19:47:44.456Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/patrick-harding/page/1.html</loc><lastmod>2023-01-27T22:21:32.792Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/paul-van-der-lee/page/1.html</loc><lastmod>2023-02-02T20:04:06.506Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/rob-otto/page/1.html</loc><lastmod>2023-01-27T22:15:13.457Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ryan-kogelheide/page/1.html</loc><lastmod>2023-02-02T20:03:45.529Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/saira-guthrie/page/1.html</loc><lastmod>2023-01-27T00:02:20.524Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jeremie-miller/page/1.html</loc><lastmod>2023-01-27T22:43:47.555Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/john-dasilva/page/1.html</loc><lastmod>2023-01-27T00:23:23.164Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/sascha-preibisch/page/1.html</loc><lastmod>2023-01-27T22:10:53.77Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/scott-tomilson/page/1.html</loc><lastmod>2023-01-25T20:40:13.815Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/tarun-madiraju/page/1.html</loc><lastmod>2023-01-25T20:44:12.987Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/diana-jouard/page/1.html</loc><lastmod>2023-01-27T22:56:56.464Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/zain-malik/page/1.html</loc><lastmod>2023-01-13T03:39:25.877Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/nicole-alrubaiy/page/1.html</loc><lastmod>2023-01-13T02:40:36.765Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andre-durand/page/1.html</loc><lastmod>2023-01-13T01:35:48.667Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/emily-mckeown/page/1.html</loc><lastmod>2023-01-13T02:10:26.352Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/matt-pollicove/page/1.html</loc><lastmod>2023-01-13T02:26:03.214Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/maya-ogranovitch-scott/page/1.html</loc><lastmod>2024-08-19T22:06:21.993Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/yev-koup/page/1.html</loc><lastmod>2023-11-14T19:36:07.331Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/joe-malenfant/page/1.html</loc><lastmod>2023-11-15T00:45:14.9Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/andrew-hughes/page/1.html</loc><lastmod>2023-11-15T22:18:47.858Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/mehmet-yaliman/page/1.html</loc><lastmod>2023-01-13T02:30:04.496Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/edward-killeen/page/1.html</loc><lastmod>2023-01-13T02:09:08.927Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/philippe-de-ryck/page/1.html</loc><lastmod>2022-12-02T00:22:37.419Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jordan-griffith/page/1.html</loc><lastmod>2023-11-15T00:39:33.02Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/richard-bird/page/1.html</loc><lastmod>2023-02-02T20:02:23.095Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/steve-dillon/page/1.html</loc><lastmod>2023-01-20T15:45:21.299Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/matt-bates/page/1.html</loc><lastmod>2023-01-26T23:24:34.354Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/alasdair-rambaud/page/1.html</loc><lastmod>2023-01-13T01:49:32.777Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/stacy-gardner/page/1.html</loc><lastmod>2023-11-14T22:30:13.996Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/samuel-brown/page/1.html</loc><lastmod>2023-11-15T00:22:20.935Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/robert-broeckelmann/page/1.html</loc><lastmod>2023-01-26T23:54:32.895Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/armin-ebrahimi/page/1.html</loc><lastmod>2023-02-17T22:17:31.541Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/aubrey-turner/page/1.html</loc><lastmod>2023-11-15T19:28:07.804Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/divya-handa/page/1.html</loc><lastmod>2023-12-01T01:44:33.056Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/yariv-levavi/page/1.html</loc><lastmod>2023-01-27T00:11:19.872Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/adam-rusbridge/page/1.html</loc><lastmod>2024-08-20T18:21:52.737Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/george-lattimore/page/1.html</loc><lastmod>2023-01-13T02:13:25.087Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/mindy-servello/page/1.html</loc><lastmod>2023-01-13T02:36:36.528Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/aviad-maroodi/page/1.html</loc><lastmod>2023-11-15T19:02:03.532Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/joseph-dhanapal/page/1.html</loc><lastmod>2023-01-26T23:25:33.459Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/ran-wasserman/page/1.html</loc><lastmod>2023-01-13T02:43:08.909Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/thomas-schneider/page/1.html</loc><lastmod>2023-11-14T22:21:19.011Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/branden-williams/page/1.html</loc><lastmod>2023-01-13T01:58:06.813Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/nicole-reichle/page/1.html</loc><lastmod>2023-01-13T02:39:00.628Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/fritz-mandlemeier/page/1.html</loc><lastmod>2023-01-13T02:11:34.494Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/jens-keuter/page/1.html</loc><lastmod>2023-11-15T17:58:58.798Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/laurent-szpirglas/page/1.html</loc><lastmod>2023-11-15T00:35:30.647Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/alan-glickenhouse/page/1.html</loc><lastmod>2023-02-28T17:47:45.634Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anjelica-roman/page/1.html</loc><lastmod>2023-11-15T22:15:27.128Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/federico-carbone-and-vinny-sagar/page/1.html</loc><lastmod>2025-09-17T21:51:23.84Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/herb-goodfellow/page/1.html</loc><lastmod>2023-03-24T21:18:23.4Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/max-fathauer-and-herb-goodfellow/page/1.html</loc><lastmod>2025-09-17T21:51:23.84Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/sabrina-habbe/page/1.html</loc><lastmod>2023-05-05T16:59:03.384Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/louise-watson/page/1.html</loc><lastmod>2024-05-23T21:08:37.707Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/max-fathauer/page/1.html</loc><lastmod>2024-08-21T21:24:44.237Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/darrell-geusz/page/1.html</loc><lastmod>2023-11-13T19:17:47.434Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/adam-preis/page/1.html</loc><lastmod>2024-05-02T17:59:40.512Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/nicole-roseveare/page/1.html</loc><lastmod>2024-08-12T17:25:52.258Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/author/anish-srivastava/page/1.html</loc><lastmod>2024-08-16T18:23:29.992Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/downloads.html</loc><lastmod>2023-12-14T16:06:54.024Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals.html</loc><lastmod>2024-01-02T16:56:03.479Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication.html</loc><lastmod>2023-05-03T20:37:15.976Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/single-factor-two-factor-multi-factor-authentication.html</loc><lastmod>2026-02-03T16:13:33.298Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/passwordless-authentication.html</loc><lastmod>2026-01-29T20:17:18.425Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/passwordless-authentication/fido.html</loc><lastmod>2025-02-25T15:08:58.05Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/risk-based-authentication.html</loc><lastmod>2023-05-03T21:07:29.746Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/certificate-authentication.html</loc><lastmod>2022-10-20T20:46:11.203Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/token-based-authentication.html</loc><lastmod>2023-05-03T21:19:19.666Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/single-sign-on.html</loc><lastmod>2025-11-26T19:25:02.734Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/federated-identity-management.html</loc><lastmod>2023-05-03T21:25:17.783Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/chap-authentication.html</loc><lastmod>2023-02-17T17:09:01.654Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication/continuous-authentication.html</loc><lastmod>2023-05-03T21:29:11.122Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-orchestration.html</loc><lastmod>2026-02-02T23:00:15.58Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-and-access-management.html</loc><lastmod>2025-07-08T18:34:30.943Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-and-access-management/identity-providers-service-providers.html</loc><lastmod>2023-05-03T20:29:04.335Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/identity-and-access-management/centralized-decentralized-identity-management.html</loc><lastmod>2022-09-21T17:06:31.218Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/zero-trust-security.html</loc><lastmod>2026-01-29T19:04:17.778Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards.html</loc><lastmod>2022-10-10T17:05:26.737Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards/oauth.html</loc><lastmod>2025-11-26T19:49:08.516Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards/openid-connect.html</loc><lastmod>2024-10-03T17:26:56.415Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-standards/saml.html</loc><lastmod>2026-02-03T17:32:23.559Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization.html</loc><lastmod>2023-05-03T21:30:45.892Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/authorization-methods.html</loc><lastmod>2023-12-19T22:38:01.531Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/user-account-provisioning.html</loc><lastmod>2022-10-20T20:46:13.515Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/sso-directory.html</loc><lastmod>2023-05-03T21:36:32.989Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authorization/dynamic-authorization.html</loc><lastmod>2026-02-18T15:35:02.74Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols.html</loc><lastmod>2023-02-22T16:27:29.665Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/ldap.html</loc><lastmod>2023-05-03T17:46:05.183Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/scim.html</loc><lastmod>2023-05-04T16:03:10.768Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/webauthn.html</loc><lastmod>2023-05-04T16:21:57.57Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/kerberos.html</loc><lastmod>2023-05-04T16:52:22.744Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/authentication-authorization-protocols/ws-trust.html</loc><lastmod>2024-10-04T22:26:11.365Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/b2b-identity.html</loc><lastmod>2025-07-01T20:28:45.842Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/agentic-ai.html</loc><lastmod>2025-10-24T17:10:47.353Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/agentic-ai/key-iam-considerations.html</loc><lastmod>2025-10-24T17:17:42.573Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/agentic-ai/classes-and-use-cases.html</loc><lastmod>2025-10-24T17:17:49.718Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/agentic-ai/iam-best-practices-ai-agents.html</loc><lastmod>2025-10-24T17:17:58.716Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/agentic-ai/reference-implementation-patterns.html</loc><lastmod>2025-10-24T17:13:23.953Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/agentic-ai/runtime-identity.html</loc><lastmod>2026-04-07T18:37:04.86Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management.html</loc><lastmod>2025-07-15T21:52:39.105Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management/what-is-centralized-identity-management.html</loc><lastmod>2025-07-16T14:24:04.48Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management/how-does-centralized-identity-management-work.html</loc><lastmod>2025-07-16T14:24:05.3Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/identity-fundamentals/centralized-identity-management/authentication-authorization-standards.html</loc><lastmod>2025-07-16T14:24:05.563Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library.html</loc><lastmod>2023-06-27T18:32:52.093Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/articles/digital-transformation.html</loc><lastmod>2024-02-15T22:04:23.929Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/articles/secure-digital-identities.html</loc><lastmod>2022-09-27T23:08:14.239Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/content-library/articles/authentication-authorization-web-api.html</loc><lastmod>2022-09-27T23:09:15.296Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals.html</loc><lastmod>2024-01-16T23:30:41.707Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats.html</loc><lastmod>2024-01-16T23:16:43.127Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/clickjacking.html</loc><lastmod>2026-04-07T23:29:24.478Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/cross-site-scripting.html</loc><lastmod>2024-01-16T23:47:38.803Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/internet-of-things-attack.html</loc><lastmod>2024-01-16T23:11:02.278Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/botnet-attack.html</loc><lastmod>2026-04-07T23:09:59.605Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/credential-stuffing.html</loc><lastmod>2023-11-02T19:10:08.991Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/ransomware-as-a-service-raas.html</loc><lastmod>2024-01-16T23:58:34.94Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/buffer-overflow-attack.html</loc><lastmod>2022-11-03T14:20:27.341Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/rootkit.html</loc><lastmod>2023-12-19T22:40:10.219Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/distributed-denial-of-service-ddos-attack.html</loc><lastmod>2022-11-03T14:20:29.024Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/keylogger.html</loc><lastmod>2024-01-16T23:55:49.333Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/sql-injection.html</loc><lastmod>2024-01-16T23:54:33.259Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/man-in-the-middle-attack.html</loc><lastmod>2023-02-16T19:49:02.526Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/threats/zero-day-exploit.html</loc><lastmod>2023-02-16T19:49:02.981Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk.html</loc><lastmod>2024-01-16T23:24:52.31Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk/fraudulent-device-detection.html</loc><lastmod>2024-01-16T23:28:25.114Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk/soar.html</loc><lastmod>2025-07-01T20:12:54.927Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/detect-risk/impossible-travel-101.html</loc><lastmod>2025-10-23T19:48:47.521Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/cybersecurity-fundamentals/mitigate-risk.html</loc><lastmod>2024-01-16T20:47:28.524Z</lastmod></url><url><loc>https://www.pingidentity.com/de/ty.html</loc><lastmod>2022-01-28T16:02:09.27Z</lastmod></url><url><loc>https://www.pingidentity.com/de/events/art-of-the-possible.html</loc><lastmod>2026-02-10T22:17:02.96Z</lastmod></url><url><loc>https://www.pingidentity.com/de/events/it-sa-expo-congress.html</loc><lastmod>2024-09-10T14:15:31.001Z</lastmod></url><url><loc>https://www.pingidentity.com/de/legal/gdpr-compliance-faq.html</loc><lastmod>2024-11-18T17:58:11.777Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability.html</loc><lastmod>2026-02-10T21:32:18.121Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/authentication-authority.html</loc><lastmod>2026-04-02T21:01:45.318Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/directory.html</loc><lastmod>2026-04-14T16:06:18.312Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-verification.html</loc><lastmod>2026-03-26T15:51:02.143Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/multi-factor-authentication.html</loc><lastmod>2026-04-03T23:22:51.178Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-orchestration.html</loc><lastmod>2026-04-14T16:37:55.245Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/single-sign-on.html</loc><lastmod>2026-04-03T23:15:01.109Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/threat-protection.html</loc><lastmod>2026-04-03T14:10:46.046Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/authorization.html</loc><lastmod>2026-04-13T19:37:51.608Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-management.html</loc><lastmod>2025-05-06T19:05:14.236Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-governance.html</loc><lastmod>2026-01-22T00:36:18.964Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/identity-cloud-security.html</loc><lastmod>2025-05-06T19:05:15.169Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/edge-security.html</loc><lastmod>2025-05-06T19:05:16.814Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/verifiable-credentials.html</loc><lastmod>2026-04-17T15:36:36.06Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/lifecycle-management.html</loc><lastmod>2025-05-06T19:05:18.914Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/jit-privileged-access.html</loc><lastmod>2026-03-26T15:50:54.192Z</lastmod></url><url><loc>https://www.pingidentity.com/de/capability/zero-knowledge-biometrics.html</loc><lastmod>2026-01-21T16:47:13.438Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry.html</loc><lastmod>2026-02-26T18:50:04.547Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/healthcare.html</loc><lastmod>2026-03-05T16:46:34.114Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/manufacturing.html</loc><lastmod>2026-03-04T16:19:19.225Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/retail.html</loc><lastmod>2026-03-16T21:36:30.105Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/media-telco.html</loc><lastmod>2026-03-05T19:18:39.705Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/automotive.html</loc><lastmod>2026-04-09T18:40:47.562Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/insurance.html</loc><lastmod>2026-03-05T16:56:47.135Z</lastmod></url><url><loc>https://www.pingidentity.com/de/industry/financial-services.html</loc><lastmod>2026-03-10T17:51:01.397Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product.html</loc><lastmod>2026-03-18T16:03:22.749Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingaccess.html</loc><lastmod>2026-04-07T23:42:34.859Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingauthorize.html</loc><lastmod>2025-05-06T19:05:32.516Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingcentral.html</loc><lastmod>2025-05-06T19:05:35.341Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingdirectory.html</loc><lastmod>2025-05-06T19:05:38.833Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingfederate.html</loc><lastmod>2026-04-07T22:31:35.266Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pinggateway.html</loc><lastmod>2025-05-06T19:05:34.531Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pinggateway/capability.html</loc><lastmod>2025-05-06T19:05:35.091Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingid.html</loc><lastmod>2025-12-05T20:35:58.692Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-authorize.html</loc><lastmod>2025-05-06T19:05:29.004Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-credentials.html</loc><lastmod>2025-12-15T22:40:47.584Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-davinci.html</loc><lastmod>2025-12-15T20:14:15.275Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-mfa.html</loc><lastmod>2025-05-06T19:05:29.877Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-protect.html</loc><lastmod>2026-03-18T22:49:07.901Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-verify.html</loc><lastmod>2026-04-11T15:35:48.062Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/pingone-recognize.html</loc><lastmod>2026-03-17T22:14:23.059Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/agent-gateway.html</loc><lastmod>2026-04-02T17:20:30.945Z</lastmod></url><url><loc>https://www.pingidentity.com/de/product/agent-iam-core.html</loc><lastmod>2026-04-02T17:20:32.917Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution.html</loc><lastmod>2026-04-08T19:25:33.005Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/prevent-online-fraud.html</loc><lastmod>2026-04-20T17:38:21.528Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/passwordless.html</loc><lastmod>2026-04-20T17:14:48.305Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/iam-modernization.html</loc><lastmod>2025-05-06T19:05:46.001Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/privacy-consent.html</loc><lastmod>2026-04-20T17:50:21.882Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/zero-trust.html</loc><lastmod>2026-04-20T18:33:29.491Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/iot.html</loc><lastmod>2026-04-16T22:48:40.395Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/workforce-identity.html</loc><lastmod>2026-04-20T18:23:22.792Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/b2b-identity.html</loc><lastmod>2026-04-20T16:15:58.248Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/cloud-identity.html</loc><lastmod>2026-04-20T16:27:45.257Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/agentic-ai-identity.html</loc><lastmod>2026-04-20T16:01:12.054Z</lastmod></url><url><loc>https://www.pingidentity.com/de/solution/decentralized-identity.html</loc><lastmod>2026-04-20T17:03:11.071Z</lastmod></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/api-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/industry-standards/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/customer-partner/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/customer-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/developers/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/events/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/identity-101/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/iam-modernization/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/identity-security/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/mfa/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/ping-news/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/passwordless/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/products-support/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/regulations-compliance/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/sso/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/workforce-identity/page/1.html</loc></url><url><loc>https://www.pingidentity.com/de/resources/blog/search/category/zero-trust/page/1.html</loc></url></urlset>