<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url><loc>https://www.telloiam.com/</loc></url>
<url><loc>https://www.telloiam.com/book-a-demo</loc></url>
<url><loc>https://www.telloiam.com/request-a-trial</loc></url>
<url><loc>https://www.telloiam.com/blog</loc></url>
<url><loc>https://www.telloiam.com/contact-us</loc></url>
<url><loc>https://www.telloiam.com/privacy-policy</loc></url>
<url><loc>https://www.telloiam.com/404</loc></url>
<url><loc>https://www.telloiam.com/company</loc></url>
<url><loc>https://www.telloiam.com/platform/user-lifecycle-automation</loc></url>
<url><loc>https://www.telloiam.com/platform/continuous-monitoring</loc></url>
<url><loc>https://www.telloiam.com/platform/role-based-access-control</loc></url>
<url><loc>https://www.telloiam.com/platform/compliance-and-reporting</loc></url>
<url><loc>https://www.telloiam.com/company/careers</loc></url>
<url><loc>https://www.telloiam.com/legal/msa</loc></url>
<url><loc>https://www.telloiam.com/events</loc></url>
<url><loc>https://www.telloiam.com/apps</loc></url>
<url><loc>https://www.telloiam.com/blog/how-iam-user-provisioning-supports-identity-governance-and-compliance</loc></url>
<url><loc>https://www.telloiam.com/blog/risk-prevention-and-remediation-for-identity-access-drift</loc></url>
<url><loc>https://www.telloiam.com/blog/deprovisioning-done-right-understanding-access-risks-during-offboarding</loc></url>
<url><loc>https://www.telloiam.com/blog/defining-iam-system-goals-stategies-and-access-controls</loc></url>
<url><loc>https://www.telloiam.com/blog/using-role-based-access-control-with-predefined-roles-for-iam</loc></url>
<url><loc>https://www.telloiam.com/blog/five-common-risks-of-poor-user-account-provisioning</loc></url>
</urlset>