<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.dotnext.co.za</loc>
<lastmod>2026-02-19T08:55:29.074Z</lastmod>
<changefreq>monthly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/about</loc>
<lastmod>2026-02-19T08:55:29.074Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/services</loc>
<lastmod>2026-02-19T08:55:29.074Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog</loc>
<lastmod>2026-02-19T08:55:29.074Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/partners</loc>
<lastmod>2026-02-19T08:55:29.074Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/demystifying-privileged-access-management-redefining-requirements-and-selection</loc>
<lastmod>2025-10-15T06:34:40.672Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/the-five-pillars-of-iam-a-guide-to-balanced-security</loc>
<lastmod>2025-10-13T12:40:59.103Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/getting-authentication-right-mfa-passwords-and-beyond</loc>
<lastmod>2025-10-13T13:03:13.193Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/building-secure-iam-architecture-integration-zero-trust-and-shared-responsibility</loc>
<lastmod>2025-10-13T12:46:08.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/auditing-in-iam-turning-compliance-into-continuous-insight</loc>
<lastmod>2025-10-13T13:03:54.534Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/decoding-iam-authorisation-roles-attributes-and-dynamic-access-policies</loc>
<lastmod>2025-10-13T13:04:26.247Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/iam-automation-fundamentals-streamlining-jml-access-requests-and-password-resets</loc>
<lastmod>2025-10-13T13:05:20.927Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/privileged-access-management-explained-history-evolution-and-future</loc>
<lastmod>2025-10-13T12:51:32.550Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.dotnext.co.za/blog/12-challenges-breaking-the-pam-status-quo-and-how-to-overcome-them</loc>
<lastmod>2025-10-13T13:01:36.548Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
</urlset>
