<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://splitsecure.com</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/contact</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/how-it-works</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/about</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/privacy</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/terms</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/pricing</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/blog</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/industries/banks</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/industries/msp-mssps</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/industries/enterprise</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/industries/small-teams</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/passwordless-login</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/support</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/vaulting</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/third-party-risk-management</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/secure-actions</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/pam-iam</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/managed-service-providers</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/digital-assets</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/financial-regulatory-compliance</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/break-glass</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/pki-machine-identity</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/service-providers</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/sec-reg-s-p</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/nydfs-tprm-regulations</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/remote-monitoring-management-rmm</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/use-cases/cryptographic-sovereignty</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/end-user-privacy-policy</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/industry-papers</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/material/splitsecure-use-cases</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/assets/use-cases-download</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/material/zero-trust</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/assets/zero-trust-download</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/material/eliminating-third-party-risk-in-financial-services</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/assets/third-party-risk-download</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/material/digital-asset-custody-operations-control</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/resources/assets/digital-asset-custody-operations-download</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/akeyless-alternative-guide-2026-comparing-splitsecure-to-akeyless</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/cyberark-alternative-for-privileged-access-management-2026-cyberark-vs-splitsecure</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/future-proofing-digital-asset-custody-depends-on-banks-using-distributed-secrets-management</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/identity-and-access-management-technology-is-not-working-for-small-banks</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/mapping-dora-compliant-access-management-to-pam</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/pam-for-financial-services-compliance-requirements-and-options-in-2026</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/the-cloudnordic-ransomware-attack-could-have-been-stopped-with-distributed-secrets-management</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/the-conduent-security-breach-could-have-been-stopped-with-distributed-secrets-management</loc>
    </url>
    <url>
        <loc>https://splitsecure.com/post/the-moveit-transfer-breach-could-have-been-stopped-with-better-access-control</loc>
    </url>
</urlset>