<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.orchid.security/book-a-demo-webflow</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/cookies-policy</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/resources</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/manage-corporate</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/modernize-legacy-applications</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/unify-fragmented-iam-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/continuously-discover-application-inventory</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/platform</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/customer-stories</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/repsol-story</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/costco-story</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/iss-story</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/company</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/book-a-demo</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/contact-us</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/careers</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/platform-2</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/webinars/identity-security-gap-webinar</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/calculator</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/book-a-demo-light</loc>
    </url>
    <url>
        <loc>https://www.orchid.security</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/identity-access-management-programs</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/grc-audit</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/incident-response-teams</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/m-a-growth-events</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/resources/videos</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/use-case/guardrails-for-autonomous-identity</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/2026-market-guide-for-guardian-agents</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/announcing-the-2026-cyber-150</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/billions-of-years-later-the-universe-gets-it---your-iam-still-doesnt</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/crn-2025-stellar-startup</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/crn-trish-women-on-the-rise-2025</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/first-orchid-cab</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/identity-prioritization-isnt-a-backlog-problem---its-a-risk-math-problem</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/if-regulators-call-you-tomorrow-can-you-prove-youre-nydfs-compliant</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/list-of-standards-and-regulations</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/missing-controls</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/much-ado-about-nothing-or-maybe-much-to-do-about-something</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/orchid-gartner-cool-vendor</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/orchid-gartner-guardian-agents</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/orchid-security-research-brief</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/press-release-introducing-orchid-security</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/prompting-openclaw-to-explore-attack-paths-in-a-simulated-enterprise</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/retrieve-your-full-application-inventory</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/self-hosted-application</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/startup-orchid-looks-to-shine-a-light-on-the-identity-dark-matter</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/the-application-haunted-house</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/the-new-perimeter-is-identity----and-its-moving-faster-than-we-are</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/the-start-of-something-special</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/the-universe-has-dark-matter-so-does-your-iam-lucky-you</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/uncovering-identity-dark-matter</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/voidlink-malware-the-identity-and-visibility-implications</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/what-happens-when-you-actually-look-inside-an-app</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/blog/why-identity-governance-is-becoming-the-front-line-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/reports/audit-playbook</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/reports/how-orchid-transformed-fsi-incident-response</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/reports/orphan-local-accounts</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/reports/the-hidden-engineering-costs-of-iam-workarounds</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/reports/the-identity-dark-matter-undermining-compliance</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/reports/the-state-of-identity-in-europe</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/reports/when-lazy-llms-meet-identity-dark-matter</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/audit-the-unauditable-real-time-grc-for-every-application</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/automate-your-sailpoint-journey-from-application-discovery-to-governance-in-hours</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/continuous-identity-observability-for-the-modern-enterprise</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/grc-ir-and-infrastructure-the-three-pillars-impacted-by-identity-dark-matter</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/master-the-machine-govern-the-invisible</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/security-that-survives-the-acquisition</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/stop-driving-blind-see-the-whole-picture</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/stop-guessing-start-observing-continuous-identity-observability-for-the-modern-enterprise</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/the-cmdb-is-broken-discover-your-real-application-landscape</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/the-invisible-attack-vector-orphans-stale-accounts-and-dark-matter</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/the-whole-story-every-identity-everywhere</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/visibility-where-you-need-it-most</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/videos/why-50-of-identity-projects-fail-and-how-to-fix-the-blueprint</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/best-identity-threat-detection-response-tools</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/best-observability-tools</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/cloud-security-posture-management-cspm-a-practical-guide</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/control-plane-identity-101-a-security-practitioners-guide</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/iam-best-practices-tips-to-strengthen-your-access-security</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/identity-fabric-guide-for-security-leaders</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/identity-hygiene-guide-whats-putting-you-at-risk</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/identity-lifecycle-management-a-complete-security-guide</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/itdr-solution-guide-identity-threat-detection-and-response-explained</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/mastering-identity-compliance-how-to-meet-every-regulation</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/non-human-identities-the-security-guide-for-modern-enterprises</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/the-cisos-guide-to-cloud-identity-visibility-tools</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/the-complete-guide-to-identity-security-posture-management</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/top-5-iam-compliance-tools-to-strengthen-access-security</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/voidlink-malware-the-identity-and-visibility-implications</loc>
    </url>
    <url>
        <loc>https://www.orchid.security/guides/what-is-identity-dark-matter-aai75</loc>
    </url>
</urlset>