<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.indykite.ai/blog/all</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/careers</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/contact-us</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/about/news</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/about/about-us</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/privacy</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/responsible-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/thank-you</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/search</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/legal-agreements</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/kbac</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/identity-knowledge-graph</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/webinars</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/events</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/download-center</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/rockstars</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/data-processing-agreement</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/subscription-agreement</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/indykite-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/demos</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/knowledge-center</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/insights</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/manufacturing</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/finance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/retail</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/subscribe</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/knowledge-center/authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/knowledge-center/glossary</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/security-and-privacy</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/telco-solutions</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/insurance-solutions</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/cookie-policy</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/download-center/ai-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/download-center/data-visibility-trust-and-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/download-center/access-and-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/download-center/industry-specific</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/contx-iq</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/solutions/securely-share-data-in-b2b-ecosystems</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/solutions/externalize-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/solutions/create-intelligent-customer-experiences</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/knowledge-center/enterprise-ai-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/knowledge-center/ai-data-security-basics</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/sandbox-agreement</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/knowledge-center/data-trust-for-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/resources/knowledge-center/graph-data-for-connected-intelligence</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/agentcontrol</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/solutions/secure-your-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/solutions/govern-unstructured-data-for-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/indykite-tags</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/2025-predictions-the-emerging-role-of-ai-agents-in-enterprises</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/2025-predictions-the-way-enterprises-use-data-is-changing</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/2026-the-enterprise-era-of-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/5-trends-that-will-shape-the-way-we-do-business-in-2023</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/a-necessary-step-in-our-commitment-to-excellence-soc-2-type-1</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/agent-security-your-ai-agent-just-accessed-the-wrong-data---heres-why</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ai-agent-security-is-broken-why-everyone-is-obsessed-with-the-wrong-problem</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ai-agents-in-the-enterprise-real-examples-and-responsible-operations</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ai-authorization-and-verified-credentials-key-trends-for-2024</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ai-friend-or-foe-secure-your-ai-deployments</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ai-is-evolving-faster-than-our-ability-to-secure-it</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ai-security-starts-at-the-data-layer-and-nobodys-ready</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ai-success-starts-with-data-you-can-trust</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ais-next-crisis-trust-will-decide-who-wins-and-who-fails</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/are-your-dirty-data-secrets-dragging-you-down</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/beating-the-95-failure-rate-the-5-that-make-ai-work</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/building-ai-and-apps-that-can-actually-be-trusted</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/can-ai-solve-your-problem</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/can-you-trust-an-ai-agent-with-your-enterprise-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/can-you-trust-your-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/ciams-systemic-flaw-and-the-power-of-relationships</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/closing-the-gap-between-ai-ambition-and-enterprise-reality</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/comparison-of-access-control-and-emerging-models-for-the-future</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/context-isnt-just-a-feature---its-the-foundation-of-tomorrows-products</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/copilot-prompt-injection-inside-the-attack-that-emptied-a-crm</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/creating-high-quality-data-products</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/customer-data-is-a-dirty-word</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/customer-experience-goes-beyond-your-brand</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/customers-favor-businesses-that-get-this-one-thing-right</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/data-trust-and-control-building-a-movement-thats-ready-for-the-future</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/delivering-knowledge-to-solve-customer-challenges</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/earning-trust-through-action-our-soc-2-type-2-milestone</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/embracing-complexity---and-using-it-to-be-faster-better-and-smarter</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/enabling-ai-architecture-context-graphs</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/enabling-ai-through-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/enhancing-ai-trust-with-identity</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/enhancing-customer-experience-with-the-hidden-power-of-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/executive-view</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/explore-experiment-and-bring-trusted-data-to-life</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/from-capable-to-responsible-the-next-chapter-for-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/getting-ahead-in-retail-with-customer-identity</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/how-copilots-no-code-ai-agents-exposed-a-fundamental-agentic-security-gap</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/how-effective-is-your-data-strategy</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/how-open-data-ecosystems-are-transforming-industries---and-whats-next</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/how-to-leverage-authorization-for-data-monetization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/how-to-optimize-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/implementing-knowledge-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/improving-business-outcomes</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/is-ai-creating-data-siloes</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/is-your-rag-a-security-risk</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/knowledge-for-the-future-of-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/knowledge-forms-the-base-of-advanced-authorization-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/let-me-talk-to-my-spreadsheet</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/no-one-model-to-rule-them-all</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/openai-connectors-are-live---and-your-data-might-be-too</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/overcome-siloed-and-fragmented-data-just-in-time-for-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/securely-enabling-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/shaping-the-future-of-digital-identity-indykite-partners-with-diacc</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-ai-bubble-isnt-just-financial---its-functional</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-benefits-of-authorization-as-a-service</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-benefits-of-leveraging-connected-data-to-drive-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-eu-ai-act-what-enterprises-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-many-faces-of-authorization-and-why-we-need-a-new-approach</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-missing-layer-for-the-agentic-enterprise</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-missing-piece-in-mcp-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-multi-million-dollar-price-of-complexity</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-new-economics-of-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-secret-behind-truly-personalized-applications</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-smartest-brands-are-using-data-in-completely-new-ways</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/the-true-cost-of-ai-securing-the-modern-web</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/time-to-deal-with-your-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/time-to-take-a-stand-on-consumer-privacy</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/times-up-for-the-straitjacket-of-legacy-iam</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/trusted-data-sharing-is-the-future</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/understanding-the-value-inherent-in-your-ciam</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/what-it-takes-to-scale-ai-in-insurance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/when-everything-is-connected-access-becomes-your-biggest-liability</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/when-good-intentions-go-rogue-the-risk-of-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/when-power-outpaces-control-the-most-severe-ai-vulnerability-yet</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/why-businesses-struggle-with-personalization-and-how-to-solve-it</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/why-context-graphs-are-critical-for-enterprise-ai-at-scale</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/why-context-matters-solving-telecom-challenges-with-graph-driven-solutions</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/why-enterprises-need-an-real-time-control-layer-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/why-human-in-the-loop-isnt-enough-for-securing-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/why-knowledge-is-important-for-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/why-your-ai-architecture-must-remain-flexible</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/blogs/your-ai-needs-intent-not-roles</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/access-required-3-0-connected-data-for-identity-the-new-frontier-of-iam</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/eventible-speakers-corner-interview-with-lasse-andresen-founder-ceo-indykite</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/expanding-the-limits-of-ai-with-identity</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/forgerock-founder-launches-indykite-to-provide-the-identity-layer-for-web3</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/fragmented-identity-a-modern-business-nightmare</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/frontier-talk</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-achieves-iso-iec-27001-certification-strengthening-foundation-for-secure-ai-and-data-use</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-and-identity-fusion-join-forces-to-fast-track-roi-on-identity-projects</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-boosts-modern-access-offering-with-acquisition-of-3edges</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-delivers-on-compliance-promise-with-soc-2-type-2-achievement</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-joins-diacc-to-enhance-trusted-digital-identity-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-launches-ai-control-suite-to-redefine-ai-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-launches-contx-iq-deep-contextual-queries-for-real-time-secure-data-delivery</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-partners-with-neo4j-to-advance-trusted-data-foundations-for-enterprise-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-partners-with-project-camara-and-deutsche-telekom-to-enable-trusted-data-ecosystems-and-drive-monetization-of-apis</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-passes-key-soc-2-milestone-boosting-quality-assurance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-soars-ahead-with-launch-of-revolutionary-identity-platform</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/indykite-unveils-identity-powered-ai-enterprise-data-platform</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/lasse-andresen-ceo-and-founder-of-indykite-10-million-raised-to-empower-teams-to-move-beyond-legacy-identity-and-access-management</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/lasse-andresen-gather-the-right-people-and-cool-things-will-happen</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/podcast-the-cyberwire-with-lasse-andresen</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/reitan-group-partners-with-indykite-to-enhance-customer-engagement-and-loyalty-experience</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/rockwell-automation-selects-indykite-to-support-digital-transformation-and-secure-data-management</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/news/strategic-software-beyond-performative-actions</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/access-control-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/ai-data-governance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/ai-governance-for-enterprises</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/building-trustworthy-ai-systems-with-data-context-governance-and-real-time-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/context-graphs-for-enterprise-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/data-trust-in-data-flows</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/dynamic-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/enabling-ai-ready-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/enterprise-ai-security-essentials</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/granular-externalized-and-dynamic-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/graph-data-integration-for-enterprise-applications</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/how-to-control-data-access-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/how-to-secure-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/how-to-secure-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/introduction-to-knowledge-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/knowledge-based-access-control-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/modernizing-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/operationalizing-context-graphs-in-enterprise-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/operationalizing-graph-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/scaling-secure-ai-for-the-enterprise</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/securing-autonomous-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/the-future-of-ai-agents-depends-on-data-trust</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/the-next-generation-of-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/unstructured-data-turning-enterprise-content-into-ai-insights</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/what-is-agentic-ai-and-how-it-changes-enterprise-systems-and-execution</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/what-is-authorization-and-why-is-it-important</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/what-is-graph-data-and-why-it-matters-for-enterprise-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/why-agentic-ai-breaks-traditional-security-models-and-what-it-means-for-agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/knowledge-center/why-data-trust-is-essential-for-enterprise-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/ik-after-hours</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-data-governance-conference-europe</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-data-summit</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-digital-enterprise-cio-transformation-assembly</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-eic-2025</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-future-identity-customer-north-america</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-identiverse</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-industry-of-things-world-usa</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-manufacturing-it-ot-summit</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-money-20-20</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-nordic-initiative-meetup</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-oauth-security-workshop-2025</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-supernova-2026</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-the-inaugural-context-graph-meetup</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-the-knowledge-graph-conference</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-the-knowledge-graph-conference-2</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-at-yyc-datacon</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-is-coming-to-new-york-city</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/indykite-is-coming-to-toronto</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/events/wings-drinks</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/agentcontrol-product-sheet</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/contx-iq-architecture-guide</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/contx-iq-product-sheet</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/data-at-production-speed-the-future-of-smart-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/data-trust-and-control-for-enterprise-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-accelerate-digital-transformation-in-manufacturing-e-guide</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-advancing-authorization-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-data-trust-whitepaper</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-how-to-leverage-authorization-for-data-monetization-e-guide</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-the-e-guide-leveraging-unified-data-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-the-e-guide-leveraging-unified-identity-for-retail-and-ecommerce</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-the-kbac-product-sheet</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/download-whitepaper-improving-customer-experience-with-dynamic-and-fine-grained-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/e-guide-access-control-for-ai-agents</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/e-guide-rag-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/e-guide-securing-the-future-of-telecommunications-with-contextualized-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/e-guide-the-access-control-playbook</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/e-guide-the-ai-security-playbook</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/from-chaos-to-control-overcoming-data-complexity</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/indykite-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/indykite-tags</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/manage-risk-and-prevent-fraud</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/patterns-for-graph-based-authorization-in-banking</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/safely-leverage-and-use-sensitive-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/secure-b2b-data-sharing-at-scale</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/the-future-of-intelligent-digital-experiences</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/the-intelligent-data-advantage-for-insurance-portfolios</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/unlocking-unstructured-data-for-ai-native-applications</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center/whitepaper-the-transformative-power-of-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-adversarial-inputs-in-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-ai-security-threats</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-data-silos</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-directory-information-services</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-dynamic-access-tokens</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-knowledge-graphs</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-policy-decision-points-pdps</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-are-policy-enforcement-points-peps</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-does-agent-native-mean</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-0auth2</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-connected-data-model</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-data-catalog</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-data-control-engine</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-data-mesh</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-graph-model</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-model-context-protocol</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-multi-agent-system</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-schema</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-semantic-layer</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-system-of-intelligence</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-a-unified-data-layer</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-active-metadata</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-adaptive-access</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-agent-access</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-agentcontrol</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-agentic-ai-2</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-agentic-ai-identity-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-agentic-ai-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-agentic-commerce</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-agentic-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-agent-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-application-security-aias</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-assurance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-data-governance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-data-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-governance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-orchestration</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-poisoning</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-prompt-injection-2</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-ready-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-risk</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-risk-mitigation</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-trust</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ai-usage-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-agent-native-data-model</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-agentic-application</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-agentic-experience</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-agentic-security-risk</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-agentic-security-solution</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-agentic-security-threat</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-ai-agent</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-ai-context-engine</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-ai-data-translation-layer</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-ai-ready-data-model</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-ai-security-platform-aisp</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-identity-knowledge-graph</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-an-operational-data-layer</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-attribute-based-access-control-abac</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-authorization-authz</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-authzen</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-b2b-data-sharing</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-connected-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-context-aware-enforcement</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-context-aware-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-context-based-access-control-cbac</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-contextual-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-contextualized-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-contx-iq</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-access</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-ai-poisoning</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-assurance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-classification</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-enablement</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-entity-matching</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-fabric</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-governance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-integration</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-lineage</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-management</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-modelling</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-observability</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-poisoning</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-profiling</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-provenance</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-risk-scoring</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-transformation</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-trust-scoring</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-veracity</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-data-visibility-in-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-dynamic-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-dynamic-enforcement</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-enterprise-knowledge-search</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-enterprise-search</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-externalized-authorization</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-fine-grained-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-first-party-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-fragmented-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-graph-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-graph-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-graph-data-modeling</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-graph-integration</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-intent-based-access-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-just-in-time-access-jit</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-knowledge-based-access-control-kbac</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-least-privilege</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-llm-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-model-inversion</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-multi-agent-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ontology</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-owasp-agentic-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-policy-based-access-control-pbac</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-rag-protection</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-rag-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-ragprotect</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-real-time-data-visibility</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-retrieval-augmented-generation-rag</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-secure-model-coordination</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-structured-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-technical-debt</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-the-ai-lifecycle</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-trism</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-trust-fabric</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-trust-scoring</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-trusted-data-use</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-unauthorized-inference-in-ai</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-unified-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-unstructured-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-user-approved-data-sharing</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-zero-party-data</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/glossary/what-is-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center-categories/access-and-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center-categories/ai-security</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center-categories/data-visibility-trust-and-control</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center-categories/industry-specific</loc>
    </url>
    <url>
        <loc>https://www.indykite.ai/download-center-categories/other</loc>
    </url>
</urlset>