<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
    <url>
        <loc>https://videos.elimity.com/the-rise-of-ivip-game-changer-or-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=124091198</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968571/124091198/847851448075d8ec8c8e2e258ec35aa3/video_medium/the-rise-of-ivip-game-changer-or-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968571/124091198/847851448075d8ec8c8e2e258ec35aa3/small/the-rise-of-ivip-game-changer-or-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Rise of IVIP - Game Changer or Hype?</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;The Rise of Identity Visibility and Intelligence Platforms (IVIP)&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;&lt;strong&gt;Game Changer or Hype?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Identity programs are under pressure.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;Cloud, SaaS sprawl, non-human identities, and AI-driven access have pushed traditional IAM and IGA beyond their limits. Even the most mature environments struggle with one critical challenge: &lt;strong&gt;visibility&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this exclusive webinar, two industry leaders &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;strong&gt;&lt;u&gt;Dr. Maarten Decat&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; (CEO and Co-Founder Elimity)&lt;/strong&gt; and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/heiko-klarl/"&gt;&lt;strong&gt;&lt;u&gt;Dr. Heiko Klarl&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; (CEO Nexis)&lt;/strong&gt; come together for an open, unscripted conversation on Gartner’s newest category:&amp;nbsp;&lt;strong&gt;Identity Visibility &amp;amp; Intelligence Platforms (IVIP).&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;True shift in identity governance or just the next buzzword?&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;What to expect&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This session is hosted in a &lt;strong&gt;podcast-style format&lt;/strong&gt;, with minimal slides and maximum conversation. You can join live or simply listen on the road.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You’ll gain clarity on:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ What IVIP actually means&lt;/p&gt;
&lt;p&gt;↳ The real-world problems and opportunities customers face today&lt;/p&gt;
&lt;p&gt;↳ Why IGA alone is no longer enough to achieve full identity control&lt;/p&gt;
&lt;p&gt;↳ How IVIP complements IAM and IGA in practice&lt;/p&gt;
&lt;p&gt;↳ The future of identity governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The discussion will be moderated by &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/timo-copp/"&gt;&lt;strong&gt;&lt;u&gt;Timo Copp&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; (Managing Director&amp;nbsp;&lt;strong&gt;SonicBee&lt;/strong&gt;) and includes an &lt;strong&gt;open floor for live Q&amp;amp;A&lt;/strong&gt;.&lt;/p&gt;
</video:description>
            <video:publication_date>2026-02-26T15:01:19+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3635</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/case-study-geoxyz-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=123404654</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/video_medium/case-study-geoxyz-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968568/123404654/43be1a0716aebf73558415b4f6e65003/small/case-study-geoxyz-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Case Study - GEOxyz</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;How GEOxyz Took Control Over User Access to Support ISO 27001 Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;GEOxyz operates in a highly data-driven and security-sensitive environment. With a growing digital footprint and increasing regulatory pressure from &lt;strong&gt;ISO 27001&lt;/strong&gt; and &lt;strong&gt;NIS2&lt;/strong&gt;, the organisation needed a clear, defensible understanding of &lt;strong&gt;who has access to what&lt;/strong&gt;, &lt;strong&gt;and why&lt;/strong&gt;, across its critical systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&#128073; Download the full customer story:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/case-studies/geoxyz"&gt;https://elimity.com/case-studies/geoxyz&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;</video:description>
            <video:publication_date>2026-02-09T15:04:55+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>119</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/elimity-customer-case-m365</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=118399848</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968570/118399848/ef0316894e39ff4103d22ba037822a06/video_medium/elimity-customer-case-m365-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968570/118399848/ef0316894e39ff4103d22ba037822a06/small/elimity-customer-case-m365-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Elimity - Customer Case M365 Copilot by CISO MIke</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Hi Copilot, can you share the payslips of the CEO at my company?”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Identity risks like &lt;strong&gt;overexposed permissions&lt;/strong&gt;, &lt;strong&gt;orphaned accounts&lt;/strong&gt;, and &lt;strong&gt;weak access governance&lt;/strong&gt; can delay or even derail your deployment.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In this session, Elimity and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/mikedenbuurman/"&gt;&lt;strong&gt;&lt;u&gt;CISO Mike Den Buurman&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;What you’ll learn:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Why &lt;strong&gt;40%&lt;/strong&gt; of Copilot rollouts are &lt;strong&gt;delayed&lt;/strong&gt; (and how to avoid it)&lt;br&gt;✅ &lt;strong&gt;6 essential IAM steps&lt;/strong&gt; to secure your Copilot deployment&lt;br&gt;✅ How to get actionable &lt;strong&gt;access insights&lt;/strong&gt; in just 1 day&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Perfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.&lt;/p&gt;
</video:description>
            <video:publication_date>2025-11-11T10:55:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>52</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/6-iam-steps-you-have-to-do-before-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=118201694</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968578/118201694/298aed2802ce32f6c57361940000862e/video_medium/6-iam-steps-you-have-to-do-before-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968578/118201694/298aed2802ce32f6c57361940000862e/small/6-iam-steps-you-have-to-do-before-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>6 IAM Steps You Have To Do Before Implementing CoPilot</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;Secure Your Copilot Rollout: 6 IAM Steps You Can’t Skip&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;“Hi Copilot, can you share the payslips of the CEO at my company?”&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Are you rolling out Microsoft 365 Copilot? You’ll need more than just licenses.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Identity risks like &lt;strong&gt;overexposed permissions&lt;/strong&gt;, &lt;strong&gt;orphaned accounts&lt;/strong&gt;, and &lt;strong&gt;weak access governance&lt;/strong&gt; can delay or even derail your deployment.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this session, Elimity and &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/mikedenbuurman/"&gt;&lt;strong&gt;&lt;u&gt;CISO Mike Den Buurman&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; show you how to prepare your organization for Copilot — with a lightweight, fast-track approach to IAM.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;What you’ll learn:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅ Why &lt;strong&gt;40%&lt;/strong&gt; of Copilot rollouts are &lt;strong&gt;delayed&lt;/strong&gt; (and how to avoid it)&lt;br&gt;✅ &lt;strong&gt;6 essential IAM steps&lt;/strong&gt; to secure your Copilot deployment&lt;br&gt;✅ How to get actionable &lt;strong&gt;access insights&lt;/strong&gt; in just 1 day&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Perfect for CISOs, IT security leads, and identity owners who want to launch Copilot with confidence.&lt;/p&gt;</video:description>
            <video:publication_date>2025-11-06T08:52:12+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3102</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/the-fast-track-to-iam-maturity-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=116786930</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968575/116786930/a01e351582d54e52415994c68e4ddad9/video_medium/the-fast-track-to-iam-maturity-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968575/116786930/a01e351582d54e52415994c68e4ddad9/small/the-fast-track-to-iam-maturity-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Fast Track to IAM Maturity -  How CISOs Can Prove Control &amp; Compliance</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;The Fast Track to IAM Maturity&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;&lt;strong&gt;How CISOs Can Prove Control &amp;amp; Compliance&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;New regulations like &lt;strong&gt;NIS2&lt;/strong&gt;, &lt;strong&gt;DORA&lt;/strong&gt; and &lt;strong&gt;ISO 27001&lt;/strong&gt; require CISOs to demonstrate control over user access, clearly and quickly.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;In this session, Elimity shows you how to fast-track IAM maturity with a lightweight, audit-ready approach to identity governance.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;What you’ll learn:&lt;/p&gt;&lt;p&gt;&lt;br&gt;✅ Key IAM requirements under NIS2, DORA &amp;amp; ISO 27001&lt;br&gt;✅ How to gain access visibility in days, not months&lt;br&gt;✅ How to prove compliance without complex projects&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Perfect for CISOs, auditors, and security leaders working in regulated environments.&lt;/p&gt;</video:description>
            <video:publication_date>2025-09-25T07:31:14+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1791</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/light-iam-governance-fastest-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=113954829</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968579/113954829/aba9d5d593fba650184384146be03209/video_medium/light-iam-governance-fastest-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968579/113954829/aba9d5d593fba650184384146be03209/small/light-iam-governance-fastest-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Light IAM &amp; Governance - Fastest Track to NIS2 Compliance</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;Light IAM &amp;amp; Governance - Fastest Track to NIS2-Compliance&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;How Identum and Elimity help you automate and control user access within days.&lt;/h2&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Join us for the live webinar where experts from Identum and Elimity will walk you show you how you achieve NIS2-compliance within days.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Learn how to automate identity provisioning, gain full visibility into access rights, enforce least privilege, and simplify audits.&amp;nbsp;&lt;/p&gt;&lt;p&gt;We’ll cover:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; The NIS2 challenges European organisations are facing&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Automating secure onboarding/offboarding with Identum&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Gaining visibility and governance with Elimity&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Real-world examples of simplified compliance&lt;/p&gt;</video:description>
            <video:publication_date>2025-06-25T07:46:07+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2745</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/whos-elimity-interview-by-joobs</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=113691040</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/video_medium/whos-elimity-interview-by-joobs-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968560/113691040/c367d1ec374c4b138b05690bb0a0ec12/small/whos-elimity-interview-by-joobs-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Who's Elimity? Interview by Joobs</video:title>
            <video:description></video:description>
            <video:publication_date>2025-06-13T08:13:02+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>116</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/identity-data-from-chaos-to-5</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=112989989</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968567/112989989/754f9d82895bb3e3c6b065f71beb9222/video_medium/identity-data-from-chaos-to-5-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968567/112989989/754f9d82895bb3e3c6b065f71beb9222/small/identity-data-from-chaos-to-5-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Identity Data: From Chaos to Visibility</video:title>
            <video:description>&lt;p&gt;Many organizations rely on siloed IAM tools, leading to duplicated processes and &lt;strong&gt;limited data visibility.&lt;/strong&gt; But IAM isn’t just about automation, it’s about gaining insights from identity data to stay secure and compliant.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;An &lt;strong&gt;identity data fabric&lt;/strong&gt; connects data across all IAM sources, delivering the visibility and control today’s environments demand.&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;That’s why we’re hosting a focused webinar on how &lt;strong&gt;data-driven Identity and Access Management &lt;/strong&gt;(IAM) can help you move from identity chaos to clarity:&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;✅ Why IAM projects often fail in modern, distributed environments&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; 5 practical tips to gain identity visibility in days—not months&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Real-world insights from a Fortune 500 company&lt;/p&gt;&lt;p&gt;✅&amp;nbsp; Live demo: how identity data analytics empowers agile IAM&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;When?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&#128197; &lt;strong&gt;Date&lt;/strong&gt;: May 20th, 2025&lt;br&gt;&#128338; &lt;strong&gt;Time&lt;/strong&gt;: 9:00 AM CET&lt;/p&gt;</video:description>
            <video:publication_date>2025-05-20T07:40:25+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2405</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/why-did-q42-go-for-iso-27001-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=110979408</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/video_medium/why-did-q42-go-for-iso-27001-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968558/110979408/17633a54a4da9dd0a201c3e362cba3c6/small/why-did-q42-go-for-iso-27001-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Why did Q42 go for ISO 27001 Certification? ✅</video:title>
            <video:description>Customer Q42 pursued ISO 27001 certification to enhance their information security practices and meet industry standards.&lt;/p&gt;
&lt;p&gt;This certification is internationally recognized and demonstrates a commitment to managing information securely, which is crucial for engaging in international projects like #Hacktheplanet. Additionally, achieving ISO 27001 helps improve the overall security posture of the organization, ensuring that data is protected against potential threats.</video:description>
            <video:publication_date>2025-03-19T10:02:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>64</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/why-did-q42-choose-for-elimity</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=110976294</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/video_medium/why-did-q42-choose-for-elimity-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968580/110976294/e7d965752c8b7c653ca93aa35df77278/small/why-did-q42-choose-for-elimity-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Why did Q42 choose for Elimity?</video:title>
            <video:description>&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2025-03-19T09:32:16+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>179</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/what-was-q42s-approach-to-identity</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=110976291</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/video_medium/what-was-q42s-approach-to-identity-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968580/110976291/5153abb03dbd8cd7e01acda7a6f556aa/small/what-was-q42s-approach-to-identity-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What was Q42's approach to Identity Governance? </video:title>
            <video:description>&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2025-03-19T09:32:13+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>163</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/why-did-q42-go-for-iso-27001</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=110976287</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/video_medium/why-did-q42-go-for-iso-27001-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968580/110976287/72fba439568130226ad1b3e02209afcc/small/why-did-q42-go-for-iso-27001-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Why did Q42 go for ISO 27001 Certification? &#128272;</video:title>
            <video:description>&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2025-03-19T09:32:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>64</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/what-were-q42s-identity-challenges</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=110976280</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/video_medium/what-were-q42s-identity-challenges-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968580/110976280/3eca7d7c1ded91417fef7f76525a7426/small/what-were-q42s-identity-challenges-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What were Q42's Identity Challenges? </video:title>
            <video:description>&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2025-03-19T09:31:57+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>105</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/customer-story-q42-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=110765597</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968578/110765597/3ab5dbd28849bfce147a96abdf0e5385/video_medium/customer-story-q42-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968578/110765597/3ab5dbd28849bfce147a96abdf0e5385/small/customer-story-q42-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Customer Story Q42</video:title>
            <video:description>&lt;h1&gt;Road to ISO 27001 - How Digital Studio Q42 Simplified Identity Governance with Elimity&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Join us for a session with our customer&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en"&gt;&lt;strong&gt;&lt;u&gt;Q42&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;. The strategic technology agency, part of the Nordic consultancy collective&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://eidra.com/"&gt;&lt;u&gt;Eidra&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;builds digital products with renowned brands like&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/philips-hue1"&gt;&lt;u&gt;Philips Hue&lt;/u&gt;&lt;/a&gt;,&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/hema"&gt;&lt;u&gt;HEMA&lt;/u&gt;&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://q42.nl/en/work/rijks-website1"&gt;&lt;u&gt;Rijksmuseum&lt;/u&gt;&lt;/a&gt;. Q42's COO Jasper Kaizer shares their journey with Elimity and how they gained strict control over user access to meet ISO 27001 certification requirements.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ &lt;strong&gt;Challenges &amp;amp; Solutions:&lt;/strong&gt; Learn how Q42 tackled identity governance challenges and why they needed a lightweight solution that seamlessly connects to their crucial systems.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Q42’s Perspective:&lt;/strong&gt; Hear from Jasper Kaizer, COO of Q42, on their journey to improved security and compliance readiness.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;✅ &lt;strong&gt;Live Demo:&lt;/strong&gt; See how Elimity enables fast and efficient user access management without the complexity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128467;️ &lt;strong&gt;Date&lt;/strong&gt;: March 12th at 4:00 PM CET&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/maartendecat/"&gt;&lt;u&gt;Maarten Decat&lt;/u&gt;&lt;/a&gt;: VP Product and Co-Founder Elimity&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.linkedin.com/in/jkaizer/ "&gt;&lt;u&gt;Jasper Kaizer&lt;/u&gt;&lt;/a&gt;: Chief Operational Officer Q42&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128640; &lt;strong&gt;Don’t miss out—register now to secure your spot!&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2025-03-12T15:44:34+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2636</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/how-to-prove-that-you-are-in-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=109396985</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/video_medium/how-to-prove-that-you-are-in-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968580/109396985/1cad2bbb74dd6fa233e37c9f63cbddeb/small/how-to-prove-that-you-are-in-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to prove that you are in control</video:title>
            <video:description></video:description>
            <video:publication_date>2025-01-30T11:24:01+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>403</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/the-challenge-manual-access-reviews</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=108652521</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/video_medium/the-challenge-manual-access-reviews-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968555/108652521/67c8149f682d4e391f8b91afa7d501fe/small/the-challenge-manual-access-reviews-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The Challenge: Manual Access Reviews</video:title>
            <video:description>In this short clip from our webinar “What is IGA Light”, Ivar Lyse (Customer Success at Cloudworks) highlights the biggest hurdles organisations face with access reviews:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1️⃣ Need for Access Reviews due to Compliance requirements (GXP, ISO27001)&lt;/p&gt;
&lt;p&gt;2️⃣ Self-developed Excel-based access reviews&lt;/p&gt;
&lt;p&gt;3️⃣ Extremely complex IAM landscape with multiple systems and directories&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Learn why these issues lead to inefficiencies, high costs, and increased risks—and how modern solutions can help.</video:description>
            <video:publication_date>2025-01-10T14:23:54+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>45</video:duration>
            <video:category>Videos</video:category>
            <video:tag>Access Reviews</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/what-is-iga-light-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=108620350</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968579/108620350/635c62891d3cb94b59fd70300eee3538/video_medium/what-is-iga-light-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968579/108620350/635c62891d3cb94b59fd70300eee3538/small/what-is-iga-light-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What is IGA Light? </video:title>
            <video:description>&lt;p&gt;Join Cloudworks and Elimity on January 9th for a practical session showcasing how Elimity’s IGA Light solution can improve the identity and access management (IAM) for your organization.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr&gt;&lt;h2&gt;&lt;strong&gt;What to Expect?&lt;/strong&gt;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Challenges &amp;amp; Solutions&lt;/strong&gt;: Understand the common IAM challenges organizations face and how Elimity’s IGA Light addresses them with simplicity and efficiency.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Live Demo&lt;/strong&gt;: See Elimity’s IGA Light in action&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cloudworks Perspective&lt;/strong&gt;: Hear from Ivar Lyse, Customer Success Manager at Cloudworks, as he shares how Cloudworks complements and enhances your IAM strategy.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Don’t miss out—register now to secure your spot!&lt;/p&gt;
</video:description>
            <video:publication_date>2025-01-09T08:48:44+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2840</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/5-tips-to-take-control-of-user-4</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=106547658</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968571/106547658/00ddb6d694c41edc5fcb408d0dc06170/video_medium/5-tips-to-take-control-of-user-4-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968571/106547658/00ddb6d694c41edc5fcb408d0dc06170/small/5-tips-to-take-control-of-user-4-thumbnail.jpg</video:thumbnail_loc>
            <video:title>5 Tips To Take Control of User Access Within Days</video:title>
            <video:description>&lt;h1&gt;Learn how to take control of your users and their accesses with Elimity and Cegeka.&amp;nbsp;&lt;/h1&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving &lt;strong&gt;#NIS2 compliance&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: start"&gt;However, user &lt;strong&gt;access governance projects&lt;/strong&gt; have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;strong&gt;&lt;u&gt;What to expect?&amp;nbsp;&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;On November 19th at 11:00 AM CET, the experts of Cegeka, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Partnership between Cegeka and Elimity&lt;/p&gt;
&lt;p&gt;✅ Why do organisations need to take control of user access?&lt;/p&gt;
&lt;p&gt;✅ How to achieve this within days?&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Cegeka, the leading European IT solutions provider, alongside the experts of Elimity.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The platform Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.&lt;/p&gt;
&lt;p style="text-align: start"&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-11-19T10:43:18+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2510</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/nis2-und-iam-wie-sie-in-kurzester-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=105894810</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968561/105894810/ebe14abb973956b2704543203ac941d8/video_medium/nis2-und-iam-wie-sie-in-kurzester-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968561/105894810/ebe14abb973956b2704543203ac941d8/small/nis2-und-iam-wie-sie-in-kurzester-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>NIS2 und IAM: Wie Sie in kürzester Zeit volle Kontrolle über Zugriffsrechte erhalten</video:title>
            <video:description>&lt;p&gt;Die NIS2-Richtlinie verlangt von Ihnen, alle Aspekte Ihrer Cybersicherheit unter Kontrolle zu haben.&amp;nbsp;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Da über 90 % der Angriffe auf den Missbrauch von Benutzerzugriffen zurückzuführen sind, ist die Kontrolle von Benutzerzugriffen entscheidend, um die NIS2-Konformität zu erreichen.&lt;br&gt;&lt;/p&gt;&lt;p&gt;Am &lt;strong&gt;Mittwoch, den 30. Oktober, um 16:00 Uhr (CET)&lt;/strong&gt; werden die Experten von &lt;strong&gt;Secusys&lt;/strong&gt;, Teil der OEDIV Gruppe, zusammen mit &lt;strong&gt;Elimity&lt;/strong&gt; eine Session veranstalten, um folgende Themen zu behandeln:&lt;br&gt;&lt;/p&gt;&lt;p&gt;✅ NIS2: Wichtige Änderungen und Auswirkungen&lt;/p&gt;&lt;p&gt;✅ NIS2 &amp;amp; IAM: Anforderungen, Governance und Berichterstattung&lt;/p&gt;&lt;p&gt;✅ Praxisbeispiel: NIS2-Konformität mit begrenzten Ressourcen erreichen&lt;/p&gt;&lt;p&gt;✅ Lösung: Leichtgewichtige Identity Governance&lt;/p&gt;</video:description>
            <video:publication_date>2024-10-30T15:45:48+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2708</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/elimity-on-kanaal-z-trends</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=105813653</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/video_medium/elimity-on-kanaal-z-trends-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968561/105813653/590225621dafb96a7343729bddff5583/small/elimity-on-kanaal-z-trends-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Elimity on Kanaal Z Trends</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;Samenwerkingen met Cegeka zet turbo op expansie van Elimity&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Belgium, [October 29rd, 2024]&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;Sinds half oktober moeten Europese KMO’s en grote bedrijven in cruciale sectoren zich beter wapenen tegen cybercriminaliteit. De Vlaamse scale-up Elimity springt op de kar van die Europese NIS2-richtlijn. Het bedrijf ontwikkelde software voor het beheer van gebruikersaccounts. ICT-consultant Cegeka zet er mee z’n schouders onder?&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The full interview:&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;&lt;a href="https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/"&gt;https://trends.knack.be/kanaal-z/z-nieuws/bekijk-samenwerkingen-met-cegeka-zet-turbo-op-expansie-van-elimity/&lt;/a&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-10-29T11:17:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>125</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/product-demo-the-lightweight</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=105693060</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968561/105693060/4813a36022313ac1c28ef5488927aa9a/video_medium/product-demo-the-lightweight-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968561/105693060/4813a36022313ac1c28ef5488927aa9a/small/product-demo-the-lightweight-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Product Demo] The Lightweight Identity Governance Platform &#128640;</video:title>
            <video:description>&lt;h1&gt;The Product Demo&lt;/h1&gt;&lt;h2&gt;"Who can access what within my organisation?"&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Having provable control over who can access is crucial for the NIS2 and ISO 27001 certifications.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity Insights is the lightweight identity governance solution that allows security teams to take control of user access within days.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity Insights allows security to easily answer the ever-growing number of IAM data questions: easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards! ✅&lt;/p&gt;
</video:description>
            <video:publication_date>2024-10-24T14:46:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1078</video:duration>
            <video:category>Product Videos</video:category>
            <video:tag>Product Demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/elimitys-identity-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=105467015</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968556/105467015/589b9d92fb750ad3294fcd7bbfa1ee35/video_medium/elimitys-identity-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968556/105467015/589b9d92fb750ad3294fcd7bbfa1ee35/small/elimitys-identity-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Elimity's Identity Security Assessment &#128640;</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;Meet Elimity’s Identity Security Assessment&lt;/strong&gt;&lt;/h1&gt;&lt;p&gt;&lt;/p&gt;
&lt;h2&gt;Get rapid insights into your identity risks!&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Elimity provides security teams with a one-time analysis of your users and their accesses with comprehensive reporting on identity risks, ensuring NIS2 and ISO 27001 certification proof, and delivered in just two weeks.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073;&amp;nbsp;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-10-18T12:38:06+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>65</video:duration>
            <video:category>Webinar recordings</video:category>
            <video:tag>product video</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/how-to-get-mature-identity</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=105467013</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968556/105467013/e68923d7741a520251776e5775862c6b/video_medium/how-to-get-mature-identity-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968556/105467013/e68923d7741a520251776e5775862c6b/small/how-to-get-mature-identity-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How to Get Mature Identity Governance with +1000 FTEs and +100's of applications?</video:title>
            <video:description>&lt;p&gt;Watch the full webinar for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why&amp;nbsp; user access reviews are important but often still managed manually.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Understand why regular user access reviews are crucial for #NIS2&lt;/p&gt;
&lt;p&gt;✅ Discover the challenges of manual access review&lt;br&gt;✅ Save time, reduce errors, and become audit-ready&lt;/p&gt;
&lt;p&gt;✅ Gain expert insights from Triple ID&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Secure your spot now – registration is free!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you like a one-time analysis of your users and their access, you can start with Elimity’s &lt;strong&gt;Identity Security Assessment&lt;/strong&gt;! &#128640;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-10-18T12:37:58+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>37</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/mastering-user-access-reviews-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=105442679</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968556/105442679/5098fa94192ed4ca9c76f425d2a208b9/video_medium/mastering-user-access-reviews-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968556/105442679/5098fa94192ed4ca9c76f425d2a208b9/small/mastering-user-access-reviews-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Mastering User Access Reviews</video:title>
            <video:description>&lt;h1&gt;&lt;strong&gt;Mastering User Access Reviews&lt;/strong&gt;&lt;/h1&gt;&lt;h2&gt;How to Replace Excel and Email with Automated Access Reviews&lt;/h2&gt;&lt;p&gt;Join us for an insightful session with our experts and our partner, Triple ID. In this webinar, we will explore why&amp;nbsp; user access reviews are important but often still managed manually.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Understand why regular user access reviews are crucial for #NIS2&lt;/p&gt;
&lt;p&gt;✅ Discover the challenges of manual access review&lt;br&gt;✅ Save time, reduce errors, and become audit-ready&lt;/p&gt;
&lt;p&gt;✅ Gain expert insights from Triple ID&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Secure your spot now – registration is free!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If you like a one-time analysis of your users and their access, you can start with Elimity’s &lt;strong&gt;Identity Security Assessment&lt;/strong&gt;! &#128640;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;a href="https://elimity.com/assessment"&gt;https://elimity.com/assessment&lt;/a&gt;&lt;/a&gt;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-10-17T14:48:17+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2853</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/start-your-identity-security</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=105248675</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/video_medium/start-your-identity-security-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968569/105248675/2c3b0dce279140d34bb7af46ae4b7e42/small/start-your-identity-security-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Start Your Identity Security Assessment with Elimity! </video:title>
            <video:description>&lt;h2&gt;Prove that you control your users and their access!&amp;nbsp;&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;
&lt;p&gt;The NIS2-Directive requires you to prove that you are in control of your users and access. Get a one-time analysis of your users and their access within the the most crucial applications and become audit-ready!&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://elimity.com/assessment"&gt;&lt;u&gt;Start your identity security assessment today&lt;/u&gt;&lt;/a&gt;! &#128640;&lt;/p&gt;
&lt;img src="https://elimity.com/assessment" alt=""&gt;</video:description>
            <video:publication_date>2024-10-10T11:23:15+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>28</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/product-demo-peer-review-with</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102644829</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968579/102644829/5019727cca39dbd659e78b43226c12b9/video_medium/product-demo-peer-review-with-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968579/102644829/5019727cca39dbd659e78b43226c12b9/small/product-demo-peer-review-with-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Product Demo] Peer Review with Elimity Insights</video:title>
            <video:description>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;</video:description>
            <video:publication_date>2024-07-02T12:20:16+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>115</video:duration>
            <video:category>Product Videos</video:category>
            <video:tag>nis2</video:tag>
            <video:tag>product demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/product-demo-how-elimity-simplifies</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102644192</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968569/102644192/33fc4a686141c38c206848754d1546bc/video_medium/product-demo-how-elimity-simplifies-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968569/102644192/33fc4a686141c38c206848754d1546bc/small/product-demo-how-elimity-simplifies-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Product Demo] How Elimity Simplifies Identity Governance for NIS2 Compliance </video:title>
            <video:description>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 10-minute product video! &#128071;</video:description>
            <video:publication_date>2024-07-02T12:10:36+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>665</video:duration>
            <video:category>Product Videos</video:category>
            <video:tag>NIS2</video:tag>
            <video:tag>Product Demo</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/nis2-sectors-v2</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102468999</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/video_medium/nis2-sectors-v2-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968575/102468999/aa667fda2ac2d70206361b5c0a9df86a/small/nis2-sectors-v2-thumbnail.jpg</video:thumbnail_loc>
            <video:title>NIS2: Sectors (V2)</video:title>
            <video:description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&lt;br&gt;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</video:description>
            <video:publication_date>2024-06-27T07:49:46+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>81</video:duration>
            <video:category>Videos</video:category>
            <video:tag>IAM</video:tag>
            <video:tag>NIS2</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/nis2-session-what-to-expect</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102468516</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/video_medium/nis2-session-what-to-expect-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968560/102468516/c7a11831db31e2ee065f1a6b53325e4b/small/nis2-session-what-to-expect-thumbnail.jpg</video:thumbnail_loc>
            <video:title>NIS2-Session: What to Expect</video:title>
            <video:description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-06-27T07:35:46+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>48</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/nis2-and-iam-5-tips-to-take-3</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102457174</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968578/102457174/eff60474213ac4ddae015ebc5481b919/video_medium/nis2-and-iam-5-tips-to-take-3-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968578/102457174/eff60474213ac4ddae015ebc5481b919/small/nis2-and-iam-5-tips-to-take-3-thumbnail.jpg</video:thumbnail_loc>
            <video:title>NIS2 and IAM:  5 Tips to Take Control of User Access Within Days</video:title>
            <video:description>&lt;p&gt;NIS2 requires you to be in control of all aspects of your cybersecurity.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With over 90% of attacks exploiting user access, controlling user access has become key to achieving #NIS2 compliance.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On June 26th at 4:00 PM CET, the experts of Inetum-Realdolmen, European leader in digital services and Elimity will host a session to cover:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ NIS2: Key Changes and Implications&lt;/p&gt;
&lt;p&gt;✅ NIS2 &amp;amp; IAM: Requirements Governance and Reporting&lt;/p&gt;
&lt;p&gt;✅ Case Study: Achieving NIS2 Compliance with Limited Resources&lt;/p&gt;
&lt;p&gt;✅ Solution: Lightweight Identity Governance&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
</video:description>
            <video:publication_date>2024-06-26T14:41:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2475</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/idata-driven-iam-the-3-main</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102142574</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/video_medium/idata-driven-iam-the-3-main-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968568/102142574/07e9f6f9460c51f7cf52de274ac71900/small/idata-driven-iam-the-3-main-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[IData-Driven IAM ] The 3 Main Challenges</video:title>
            <video:description>Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Elimity and Indigo Consulting, we see a number of recurring challenges:&lt;/p&gt;
&lt;p&gt;1️⃣ Identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud, IT and other technologies.&lt;/p&gt;
&lt;p&gt;2️⃣ Siloed information: these identities are spread across many individual environments,&lt;br /&gt;
resulting into escalating costs.&lt;/p&gt;
&lt;p&gt;3️⃣ Resource scarcity: all while IAM resources and expertise are becoming more scarce.</video:description>
            <video:publication_date>2024-06-17T14:57:18+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>108</video:duration>
            <video:category>Videos</video:category>
            <video:tag>Data-Driven IAM</video:tag>
            <video:tag>IAM</video:tag>
            <video:tag>Identity Analytics</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/idata-driven-iam-identity</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102142572</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/video_medium/idata-driven-iam-identity-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968568/102142572/1f52db3930a592edce2689be8c554683/small/idata-driven-iam-identity-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[IData-Driven IAM ] Identity Analytics on Top of your IGA</video:title>
            <video:description>At Indigo Consulting and Elimity, we see identity data challenges at companies with very large IAM teams and mature IGA deployments.&lt;/p&gt;
&lt;p&gt;In that case, even though they already have an IGA solution that manages the user lifecycle - JML -  for many applications, the teams still lack the identity visibility.&lt;/p&gt;
&lt;p&gt;And when we say teams, for these large organizations it means Auditors, Security teams, Business IT, Application owners, and so on. As a result of that, lots of time is still wasted on generating and waiting for IAM reports - and lot’s of critical data gaps are never accounted for.</video:description>
            <video:publication_date>2024-06-17T14:57:14+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>84</video:duration>
            <video:category>Videos</video:category>
            <video:tag> CMMC etc.   However</video:tag>
            <video:tag>Data-Driven IAM</video:tag>
            <video:tag> especially with regulations such as NIS2</video:tag>
            <video:tag>IAM</video:tag>
            <video:tag>Identity Analytics</video:tag>
            <video:tag>IGA</video:tag>
            <video:tag> in practice we see a number of recurring challenges: identity sprawl: there is an exponential growth of identities and access rights in many organization due to cloud</video:tag>
            <video:tag> ISO27001</video:tag>
            <video:tag> IT and other technologies</video:tag>
            <video:tag> resulting into escalating costs  Resource scarcity: all while IAM resources and expertise are becoming more scarce.</video:tag>
            <video:tag> siloed information: these identities are spread across many individual environments</video:tag>
            <video:tag> SOC2</video:tag>
            <video:tag>The reason that we chose this topic is that securing access to data and applications has become a cornerstone of any modern cybersecurity strategy</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/data-driven-iam-merger-and</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102142570</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/video_medium/data-driven-iam-merger-and-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968568/102142570/7a2664fd113d59b21679b2dfd3d687b9/small/data-driven-iam-merger-and-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Data-Driven IAM] Merger and Acquisition</video:title>
            <video:description>Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;At Indigo Consulting and Elimity, we see that merging companies struggle to have a streamlined identity and access management process.</video:description>
            <video:publication_date>2024-06-17T14:57:11+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>51</video:duration>
            <video:category>Videos</video:category>
            <video:tag>Data-Driven IAM</video:tag>
            <video:tag>IAM</video:tag>
            <video:tag>Identity Analytics</video:tag>
            <video:tag>IGA</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/data-driven-iam-start-your-iga</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102142567</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/video_medium/data-driven-iam-start-your-iga-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968568/102142567/d92c0f224b4afb06bffe976a9067f55d/small/data-driven-iam-start-your-iga-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Data-Driven IAM] Start Your IGA Journey</video:title>
            <video:description>Identity and access management (IAM) presents a complex challenge in the digital era.&lt;/p&gt;
&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy, especially with regulations such as NIS2, ISO27001, SOC2, CMMC and others.&lt;/p&gt;
&lt;p&gt;For companies at the start of their IGA journey, this data-driven, risk-driven approach has the potential to let them achieve mature access governance in a matter of days, not months.</video:description>
            <video:publication_date>2024-06-17T14:56:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>152</video:duration>
            <video:category>Videos</video:category>
            <video:tag>Data-Driven IAM</video:tag>
            <video:tag>IAM</video:tag>
            <video:tag>Identity Analytics</video:tag>
            <video:tag>Lightweight Identity Governance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/data-driven-decision-making-in-iam-1</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=102086704</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968580/102086704/43b93922907379ddbf3f78fd2d105c4d/video_medium/data-driven-decision-making-in-iam-1-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968580/102086704/43b93922907379ddbf3f78fd2d105c4d/small/data-driven-decision-making-in-iam-1-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Data-Driven Decision Making in IAM &#128202;</video:title>
            <video:description>&lt;p&gt;Identity and access management (IAM) presents a complex challenge in the digital era. IAM teams at large organizations struggle to answer the ever-growing IAM data questions.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Challenges?&lt;br&gt;&lt;/strong&gt;&lt;br&gt;❌ Failed audit findings around identity visibility&lt;/p&gt;
&lt;p&gt;❌ Overwhelming number of IAM data questions from many different stakeholders (Audit, Security, Business, ...);&lt;/p&gt;
&lt;p&gt;❌ The IGA itself provides basic and limited reporting, leading to manual work;&lt;/p&gt;
&lt;p&gt;❌ Many systems are still not connected to IGA, as this is to costly&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What To Expect?&lt;br&gt;&lt;br&gt;&lt;/strong&gt;✅ Identity Chaos: The main identity challenges&lt;/p&gt;
&lt;p&gt;✅ Data-Driven Decision Making within IAM&lt;/p&gt;
&lt;p&gt;✅ Case study: Fortune 500 financial industry leader's analytics journey&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; Your Hosts?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Indigo Consulting - IAM experts renowned for its IAM expertise, alongside Elimity, the identity data analytics company.&lt;/p&gt;
</video:description>
            <video:publication_date>2024-06-13T15:54:56+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3216</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/iam-and-nis-2-5-tips-to-take</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=101971575</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/video_medium/iam-and-nis-2-5-tips-to-take-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968569/101971575/8a93d34c57aa8c076aa75e7f3047bcae/small/iam-and-nis-2-5-tips-to-take-thumbnail.jpg</video:thumbnail_loc>
            <video:title>IAM and NIS 2: 5 Tips to Take Control of User Access Within Days </video:title>
            <video:description>NIS2 requires you to be in control of all aspects of your cybersecurity. 

With over 90% of attacks exploiting user access, controlling user access has become key to achieving NIS2-compliance.

✅ NIS2 and IAM: The Ins and Outs
✅ 5 Tips how to Control User Access within Days
✅ Customer Cases at industry leaders such as NMBS, Attentia and Federale</video:description>
            <video:publication_date>2024-06-11T09:10:47+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1341</video:duration>
            <video:category>Videos</video:category>
            <video:tag>IAM</video:tag>
            <video:tag>Identity Governance</video:tag>
            <video:tag>Keynote</video:tag>
            <video:tag>NIS2</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/iam-data-questions-every-iam-team</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=96224559</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968577/96224559/56160f296f240478cd12ab77be35819f/video_medium/iam-data-questions-every-iam-team-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968577/96224559/56160f296f240478cd12ab77be35819f/small/iam-data-questions-every-iam-team-thumbnail.jpg</video:thumbnail_loc>
            <video:title>IAM Data Questions Every IAM Team Struggles With &#129300;</video:title>
            <video:description>Do various stakeholders within your organisation require IAM insights?&lt;/p&gt;
&lt;p&gt;In this extended demo, Eli Nazarov - VP of Sales Elimity - hows how integrated identity analytics can help you answer these questions! &lt;br /&gt;
&lt;br /&gt;
For more information, contact our identity experts on shttps://elimity.com/en/start-now.</video:description>
            <video:publication_date>2024-03-28T17:03:09+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1527</video:duration>
            <video:category>Product Videos</video:category>
            <video:tag>IAM Questions</video:tag>
            <video:tag>identity data analytics</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/identity-data-from-chaos-to-3</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=95967348</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968558/95967348/61ff2209a33640a8dfa2d823aecd9ff4/video_medium/identity-data-from-chaos-to-3-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968558/95967348/61ff2209a33640a8dfa2d823aecd9ff4/small/identity-data-from-chaos-to-3-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Identity Data: From Chaos to Visibility</video:title>
            <video:description>&lt;p&gt;Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.&lt;/p&gt;
&lt;p&gt;User access governance projects however have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;What to Expect?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅ Why Do Organizations Need Identity Visibility?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅  5 Tips to Achieve This Within Days&lt;/p&gt;
&lt;p&gt;&amp;nbsp;✅  Customer Story of Financial Institution&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Your Hosts?&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This webinar is hosted by Approach Cyber, a dedicated cybersecurity and privacy service provider, alongside Elimity, who developed the lightweight identity governance platform.&lt;/p&gt;
&lt;p&gt;Both organizations encounter security leaders who are striving to manage user access but face various challenges.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Therefore, they will provide you with expert insights and best practices within the field of identity governance.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;u&gt;Interesting Reads&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&#128073;&lt;a href="https://elimity.com/resources/customer-case-take-control-within-days" target="_self"&gt;  Insurance Company Took Control of User Access Within 3 Da&lt;/a&gt;ys&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&#128073; &lt;a href="https://elimity.com/resources/customer-case-take-control-within-days" target="_self"&gt; How To Prove That You Are In Contr&lt;/a&gt;ol&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For more information, visit Approach at www.approach-cyber.com and Elimity at www.elimity.com.&lt;/p&gt;
</video:description>
            <video:publication_date>2024-03-21T15:49:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>2954</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/3-ways-identity-data-analytics-7</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=95918937</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968566/95918937/7bd4ef2a69b4e95820540c2342052848/video_medium/3-ways-identity-data-analytics-7-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968566/95918937/7bd4ef2a69b4e95820540c2342052848/small/3-ways-identity-data-analytics-7-thumbnail.jpg</video:thumbnail_loc>
            <video:title>3 Ways Identity Data Analytics Drives IAM Success</video:title>
            <video:description>&lt;p&gt;Are you grappling with Identity and Access Management (IAM) challenges?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Well, you're not alone.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lack of visibility into user access, audit findings, and custom IAM reporting might be hindering your IAM efficiency.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Here's a case study: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Large financial institution faced 3 main challenges related to understanding their IAM data:&lt;/p&gt;
&lt;p&gt;&#128073; Overwhelming and ever-increasing number of IAM data questions from stakeholders;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; High cost and inefficiency of creating custom reports and dashboards;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Poor quality of IAM data;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact: &lt;/strong&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ It took the IAM team weeks to draft one IAM report;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ Incomplete IAM data in reports leaves multiple, critical security gaps.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The New Approach: Self-Service Data Analytics&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;These were the results:&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Complete Overview of Users and Access&lt;/p&gt;
&lt;p&gt;✅ Immediate Access to IAM Insights for all Stakeholders&lt;/p&gt;
&lt;p&gt;✅ Continuous KPI Monitoring&lt;/p&gt;
&lt;p&gt;✅ Reduced Manual IAM Reporting&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why Attend&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Customer Cases: How your peers answered the ever-growing IAM questions&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Interactive Q&amp;amp;A: Get your specific IAM challenges addressed in a live Q&amp;amp;A session with our experts.&lt;/p&gt;
</video:description>
            <video:publication_date>2024-03-20T15:53:50+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>3226</video:duration>
            <video:category>Webinar recordings</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/elimity-insights-extended-demo</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=95206867</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968558/95206867/017405231417b76db8ce1fb154be6ca5/video_medium/elimity-insights-extended-demo-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968558/95206867/017405231417b76db8ce1fb154be6ca5/small/elimity-insights-extended-demo-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Elimity Insights - Extended Demo &#128253;️</video:title>
            <video:description>&lt;p&gt;&lt;strong&gt;Case Study: Major Financial Institution with Over 55,000 Employees&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Financial industry leader faced 3 main challenges related to understanding their IAM data:&lt;/p&gt;
&lt;p&gt;&#128073; High cost and inefficiency of creating custom reports and dashboards;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Overwhelming and ever-increasing number of IAM Data questions from stakeholders;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&#128073; Poor quality of IAM data;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Impact: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳The organization relied on 5-8 employees working non-stop on manual IAM reporting;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ It took the IAM team weeks to draft one IAM report;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;↳ Incomplete IAM data in reports leaves multiple, critical security gaps.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The New Approach: Self-Service Data Analytics&lt;/strong&gt;&lt;br&gt;&lt;br&gt;The financial industry leader applied self-service data analytics, integrated with its central IGA system, HR database and disconnected applications. These were the results:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;✅ Immediate Access to IAM Insights for all Stakeholders&lt;/p&gt;
&lt;p&gt;✅ Continuous KPI Monitoring: The system enables ongoing tracking of IAM performance indicators.&lt;/p&gt;
&lt;p&gt;✅ Reduced Manual Work: Significant reduction in manual IAM tasks, leading to overhead cost savings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why Attend&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Expert Insights: Hear directly from IAM professionals who solved the challenges above&lt;/p&gt;
&lt;p&gt;&amp;nbsp;↳ Interactive Q&amp;amp;A: Get your specific IAM challenges addressed in a live Q&amp;amp;A session with our experts.&lt;/p&gt;</video:description>
            <video:publication_date>2024-03-01T08:35:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>1527</video:duration>
            <video:category>Product Videos</video:category>
            <video:tag>Demo</video:tag>
            <video:tag>IAM Reporting</video:tag>
            <video:tag>Identity Data Analytics</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/prove-that-youre-in-control-of-your</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91836254</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/video_medium/prove-that-youre-in-control-of-your-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968571/91836254/87250ecd355a9b189a391d4d7df8fa8a/small/prove-that-youre-in-control-of-your-thumbnail.jpg</video:thumbnail_loc>
            <video:title>Prove That You're In Control of Your Users and Their Access</video:title>
            <video:description>&lt;h1&gt;How to That You're In Control of Your Users and Their Access&lt;br&gt;&lt;/h1&gt;&lt;h2&gt;Problem&lt;/h2&gt;&lt;p&gt;Over the last decade, IT complexity has grown to challenging levels. Almost every company now has to manage a large amount of applications in a complex IT infrastructure consisting of large amounts of accounts and permissions.&lt;/p&gt;&lt;br&gt;
&lt;h2&gt;Objective&lt;/h2&gt;Having control over who can access which data in such an environment is crucial for privacy, compliance and protecting against cyber threats.&lt;br&gt;
&lt;br&gt;&lt;h2&gt;What to expect?&lt;/h2&gt;&lt;p&gt;
In this guide, we’ll give you an overview of eight categories of key identity indicators focused on showing that you’re in control.&lt;/p&gt;
&lt;p&gt;These categories have proven to be complete for the majority of the organizations that strive for effective identity management and want to avoid major security risks.&lt;/p&gt;&lt;h2&gt;Next Steps&lt;/h2&gt;Download the guide so you can get started today &#128073; &lt;a href="https://elimity.com/guide-on-how-to-prove-that-you-are-in-control"&gt;elimity.com/guide-on-how-to-prove-that-you-are-in-control&lt;/a&gt;&lt;br&gt;</video:description>
            <video:publication_date>2023-12-19T09:52:14+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>403</video:duration>
            <video:category>Videos</video:category>
            <video:tag>Cybersecurity</video:tag>
            <video:tag>IAM KPI</video:tag>
            <video:tag>Identity and Access Management</video:tag>
            <video:tag>Identity Governance</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/the-8-challenges-of-fragmented-iam</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91407132</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/video_medium/the-8-challenges-of-fragmented-iam-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968569/91407132/66b3d67e2502b8406f345a9d2c85b24e/small/the-8-challenges-of-fragmented-iam-thumbnail.jpg</video:thumbnail_loc>
            <video:title>The 8 Challenges of Fragmented IAM Reporting</video:title>
            <video:description>&lt;span&gt;Explore the challenges encountered by mature IAM teams despite effective governance processes. &lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity,&amp;nbsp;highlights issues such as opaque approval processes, data quality challenges in IGA, high costs in RBAC deployment, and audit findings arising from disconnected critical systems.&lt;br&gt;&lt;br&gt;These hurdles underscore the need for solutions like Elimity Insights to address these IAM complexities.&lt;/span&gt;&lt;br&gt;</video:description>
            <video:publication_date>2023-12-06T14:03:27+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>75</video:duration>
            <video:category>Videos</video:category>
            <video:tag>IAM Reporting</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/what-is-fragmented-iam-reporting</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91407117</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/video_medium/what-is-fragmented-iam-reporting-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968569/91407117/d785d0384a443ed9f804b02a8cc71139/small/what-is-fragmented-iam-reporting-thumbnail.jpg</video:thumbnail_loc>
            <video:title>What is Fragmented IAM Reporting?</video:title>
            <video:description>&lt;span&gt;Discover the limitations of traditional IAM reporting methods, including reliance on pre-built reports, Excel sheets, and manual data interpretation, leading to inefficiencies and outdated insights.&lt;br&gt;&lt;br&gt;Maarten Decat, CEO and Co-Founder of Elimity, explains you about the attempts by advanced IAM teams to address these issues through data lakes and analytics tools but encountering limitations in scalability and cost-effectiveness. &lt;/span&gt;&lt;br&gt;</video:description>
            <video:publication_date>2023-12-06T14:03:20+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>83</video:duration>
            <video:category>Videos</video:category>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/customer-case-retail-has-complex</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91299556</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/video_medium/customer-case-retail-has-complex-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968561/91299556/c471ebf3f4a1fa8ce8d45f35c3cea52a/small/customer-case-retail-has-complex-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Customer Case] Retail Has Complex IAM Landscape</video:title>
            <video:description>&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;&lt;u&gt;&lt;/u&gt;Multinational Retail Company&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Active Worldwide&lt;/li&gt;&lt;li&gt;About 400k Users&lt;/li&gt;&lt;li&gt;Extremely Complex IAM landscape with multiple HR systems, domains, directories and IGAs&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;span&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.&lt;br&gt;&lt;/p&gt;&lt;/span&gt;</video:description>
            <video:publication_date>2023-12-04T11:03:04+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>75</video:duration>
            <video:category>Videos</video:category>
            <video:tag>identity data analytics</video:tag>
            <video:tag>iga</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/customer-case-pharma-company-needs</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91299554</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/video_medium/customer-case-pharma-company-needs-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968561/91299554/2e08692333732c09eb883a0a9e2a8898/small/customer-case-pharma-company-needs-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Customer Case] Pharma Company Needs IAM Visibility</video:title>
            <video:description>&lt;span&gt;&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;Global BioPharma Company&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Active in 40 countries worldwide&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;About 10k users&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Big SAP Landscape&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IGA in place for 5+ years&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A global biopharma company failed audit findings regarding identity visibility. Specific SAP reporting required which is not available out of the box. On top of that, many systems were still not connected to SAP, and unstructured data has been neglected. &lt;/p&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;/span&gt;</video:description>
            <video:publication_date>2023-12-04T11:02:59+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>111</video:duration>
            <video:category>Videos</video:category>
            <video:tag>identity data analytics</video:tag>
            <video:tag>iga</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/customer-case-fortune-500-bank</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91299546</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/video_medium/customer-case-fortune-500-bank-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968561/91299546/0598ccd6279e364a1ed33a2c5ae7f384/small/customer-case-fortune-500-bank-thumbnail.jpg</video:thumbnail_loc>
            <video:title>[Customer Case] Fortune-500 Bank Needs IAM insights at scale</video:title>
            <video:description>&lt;h2&gt;Customer Profile &#128064;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;u&gt;&lt;/u&gt;Fortune-500 bank&lt;/li&gt;&lt;li&gt;About 35k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (+5 Years)&lt;/li&gt;&lt;/ul&gt;AND&lt;br&gt;&lt;ul&gt;&lt;li&gt;European Bank&lt;/li&gt;&lt;li&gt;About 6k Employees&lt;/li&gt;&lt;li&gt;Highly Mature IGA Deployment (5+ Years)&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Challenges&amp;nbsp;&lt;/h2&gt;&lt;p&gt;A multinational retail company has multiple identity systems which have diverged, leading to inconsistencies, issues in provisioning workflows and large overhead for the helpdesk.&amp;nbsp;&lt;/p&gt;&lt;span&gt;&lt;p&gt;The IAM team tried to perform root cause analysis with manual data exports and Excel sheets., which resulted in many complex data questions without answers and no correct estimation of cyber security risks.Fortune-500 bank has a mature IGA deployment with many systems connected and much data present, but many users still have not received the information they need.&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;p&gt;System owners: who can access my application?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;IAM expert: what should I put in a role for team X?&lt;/p&gt;&lt;/li&gt;&lt;li&gt;&lt;p&gt;Security experts: orphaned accounts?&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The IAM Team attempted to report through its current IGA, Excel sheets or PowerBI. But this resulted in a large CTO for reporting (many people involved, lots of time wasted) and overly high cyber risks.&lt;/p&gt;&lt;/span&gt;</video:description>
            <video:publication_date>2023-12-04T11:02:51+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>171</video:duration>
            <video:category>Videos</video:category>
            <video:tag>identity data analytics</video:tag>
            <video:tag>iga</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/how-to-prove-that-you-are-in</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91182072</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/video_medium/how-to-prove-that-you-are-in-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968571/91182072/8f6efcb32ab35cb480acfd0a55a7cb3b/small/how-to-prove-that-you-are-in-thumbnail.jpg</video:thumbnail_loc>
            <video:title>How To Prove That You Are In Control of Users and Their Access?</video:title>
            <video:description>As security team it is essential to show the management that you are in control of your employees and their access to valuable data.&lt;/p&gt;
&lt;p&gt;Learn how you can prove control in this short tutorial video! &#128249;</video:description>
            <video:publication_date>2023-11-29T15:14:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>22</video:duration>
            <video:category>Videos</video:category>
            <video:tag>Tuturial</video:tag>
            <video:tag>User Access</video:tag>
        </video:video>
    </url>
    <url>
        <loc>https://videos.elimity.com/3-minute-product-video</loc>
        <video:video>
            <video:player_loc allow_embed="yes">https://videos.elimity.com/v.ihtml/player.html?photo_id=91181637</video:player_loc>
            <video:content_loc>https://videos.elimity.com/64968577/91181637/1f21cfc7b593f769e33fb8ad8dd00c44/video_medium/3-minute-product-video-video.mp4</video:content_loc>
            <video:thumbnail_loc>https://videos.elimity.com/64968577/91181637/1f21cfc7b593f769e33fb8ad8dd00c44/small/3-minute-product-video-thumbnail.jpg</video:thumbnail_loc>
            <video:title>3-Minute Product Video</video:title>
            <video:description>Elimity Insights lets you easily understand who can currently access what, identify risks, act upon these and prove that you've taken action afterwards. Watch now the 3-minute product video! &#128071;</video:description>
            <video:publication_date>2023-11-29T15:04:53+00:00</video:publication_date>
            <video:family_friendly>yes</video:family_friendly>
            <video:duration>170</video:duration>
            <video:category>Product Videos</video:category>
            <video:tag>Demo</video:tag>
            <video:tag>Product Video</video:tag>
        </video:video>
    </url>
</urlset>
