<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.docontrol.io</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/overview</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/how-it-works</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/about</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-ecosystem/google-workspace</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-ecosystem/microsoft-365</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-ecosystem/salesforce</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/partners</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-ecosystem/box</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-ecosystem/zoom</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/integrations</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/why-docontrol</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/use-cases/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/use-cases/saas-misconfiguration-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/use-cases/shadow-app-discovery-remediation</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/use-cases/identity-threat-detection-response</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/use-cases/insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/use-cases/data-access-governance</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/legal/privacy</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/legal/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/support</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/contact-us</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/get-a-demo</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/free-risk-asses</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/careers</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/product-tour</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-ecosystem/slack</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/resources/glossary</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/resources/news</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/resources/case-studies</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/resources/videos</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/customers</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/resources/webinars</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/resources/research-and-guides</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/resources/solution-briefs</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/rsa</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/infosecurity-europe</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/falcon</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/search</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/google-cloud</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/e/google-workspace</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/nyc-security-under-the-sun</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/industry/financial-services</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/industry/technology</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/industry/media</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/industry/retail</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/industry/healthcare</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/e/page-slug</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/e/leading-data-security-solution---stop-employees-from-stealing-critical-data</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/customers-love</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/the-thief</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/boss</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/new-lp-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-security-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/saas-dlp-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/insider-risk-management-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/identity-threat-detection-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/slack-security-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/dot</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/black-hat</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/oops</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/dlp-enhancement</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/misconfigurations-launch</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/d/dc-gws</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/partner</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/bill</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/lp/self-serve-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/manifesto</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/insider-risk-health-check</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/albert-louison</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/anna-simhovich-pearl</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/avner-schwartz</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/corey-oconnor</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/gilad-zafran</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/guy-rosenthal</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/hen-amartely-product-marketing-director</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/ilana-yakobi</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/itai</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/john-chester</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/leya-ptiha</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/liel-ran</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/matt-dubreuil</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/melissa-garcia</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/omri-weinberg</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/omri-weinberg-123</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/orr-semmel</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/saar-berkovitz</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/sarah-stein</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/shiri-shilo</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/tal-mandel-bar</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/tamir</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/author/tim-davis</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/2024-a-strong-year-of-growth-and-innovation-at-docontrol</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/2026-insider-risk-health-check</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/2026-non-human-identities-nhi-report</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/24-of-3rd-party-artificial-intelligence-ai-apps-require-risky-oauth-permissions</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/3-top-saas-apps-and-how-to-secure-them-google-workspace-slack-and-box</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/5-reasons-why-google-workspace-data-exposure-is-so-common</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/a-deep-dive-into-insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/a-feature-on-docontrols-co-founder-ceo-omri-weinberg</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/achieving-least-privilege-model-on-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/ai-driven-cybercrime</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/ai-powered-agentic-alerts</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/ai-security-use-cases</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/announcing-our-product-launch-and-series-a-round</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/automated-data-access-control-for-saas-application-security-at-scale</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/automated-security-workflows-for-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/battling-insider-threats-can-your-business-afford-a-4-75-million-fine</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/behavioral-analytics-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/best-insider-risk-management-tools-for-saas</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/box-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/breaches-and-the-delicate-dance-between-privileged-credentials-and-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/casb-complete-guide</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/casb-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/casb-solution</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/casb-vs-sase</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/clarifying-casb-dlp-sspm-terms</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/claude-code-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/claudes-agentic-ai-challenges-data-protection</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/cloud-environment-vs-saas-environment</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/cloud-security-alliance-saas-security-framework</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/coinbase-security-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/compliance-google-workspace-misconfigurations</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/consider-picking-saas-security-vendor</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/controlling-data-access-each-saas-app</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/cost-saas-data-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/crowdstrike-insider-risk-incident</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/customer-spotlight-how-docontrol-provides-cheq-security-full-visibility-their-ssss-application-estate</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/customer-spotlight-how-finaro-leverages-docontrol-to-prevent-pci-data-leakage</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/cyberhaven-alternatives-and-competitors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-breach-attack-methods</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-breach-in-nyc-schools-highlights-the-need-for-refined-data-access-to-common-saas-applications</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-breaches</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-classification-modern-approach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-loss-prevention-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-loss-prevention-technology</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-protection-for-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-protection-vs-data-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-security-for-education</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-security-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-security-for-fintech</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-security-for-healthcare</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-security-for-infrastructure-security-technology</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-security-for-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/data-security-for-media</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/dating-safety-app-tea-hit-by-massive-data-leak</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/deleting-users-isnt-enough</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-actionable-alerts-your-dedicated-private-security-team</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-appoints-kobi-afoota-as-its-head-of-information-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-customers-say-goodbye-to-underperforming-casb-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-data-classification</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-data-speed-and-scale-matters</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-expands-configuration-drift-capabilities</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-first-anniversary</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-google-labels</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-hackathon-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-included-in-forresters-the-saas-security-posture-management-landscape-q2-2023</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-included-in-the-forrester-wave-tm-saas-security-posture-management-q4-2023</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-is-now-health-insurance-portability-and-accountability-act-hipaa-compliant</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-is-recognized-in-2022-gartner-r-market-guide-for-insider-risk-management-solutions</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-jira-the-one-two-combo-you-didnt-know-you-needed</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-launches-advanced-data-scanning-capabilities</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-launches-free-trial-for-amazon-web-services-customers</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-leader-frost-sullivan-2025-saas-security-posture-management-sspm-radar</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-named-2025-spark-matrix-leader-sspm</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-named-in-2023-gartner-r-2023-hype-cycle-tm-for-data-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-named-in-two-2022-gartner-r-2022-hype-cycle-tm-reports</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-named-in-two-2022-gartner-r-emerging-tech-impact-radar-cloud-native-and-security-reports</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-named-leader-in-2024-frost-radar-sspm</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-partners-with-wursta</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-raises-30million-seriesb-round-to-redefine-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-recognized-in-forresters-the-insider-risk-solutions-landscape-q2-2024</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-report-dlp-in-2025</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-sentra-partnership</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-support-customer-success-ai</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-unveils-generative-ai-assistant-for-enhanced-google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-bettercloud</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-casb-choosing-the-right-tool-for-the-job</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-cyberhaven</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-nightfall</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-nudge</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-reco</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-spinai-comparison</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-vs-wing</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-wins-globee-in-the-17th-annual-2022-information-technology-world-awards</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-wins-prestigious-sinet16-innovator-award</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-workflows</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-workflows-remediation-misconfiguration-drift</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrol-zoom-protecting-business-critical-recorded-assets</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-2026-product-vision</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-first-black-hat</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-free-self-serve-risk-assessment</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-role-in-data-governance</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-role-in-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-role-in-insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-role-in-misconfigurations-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/docontrols-top-10-achievements-2025</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/dot-ai-powered-saas-data-security-assistant</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/dropbox-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/dropbox-vs-google-drive</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/dspm-vs-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/employee-spotlight-senior-product-manager-orr-semmel</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/employee-spotlight-senior-software-engineer-avner-schwartz</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/employee-spotlight-ux-designer-shiri-shilo</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/enabling-customer-success-at-docontrol-a-mothers-perspective</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/essential-capabilities-saas-security-platform</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/external-sharing-saas-apps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/former-employee-stealing-patient-records</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/former-employees-access-company-data</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/former-google-employee-caught-stealing-company-ai-trade-secrets</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/frontline-vs-business-plus-pro-vs-enterprise</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/gemini-access-google-drive</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/gemini-agentic-ai-security-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/gemini-in-google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/generative-ai-saas-applications-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/glean-security-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-drive-access-permissions</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-drive-data-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-drive-files-indexed-search-engines-ai</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-drive-secure-file-sharing</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-drive-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-drive-security-overview</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-gemini-gems-launch</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-dlp-capabilities-are-limited</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-dlp-data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-dlp-security-gaps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-and-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-audit</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-checklist</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-compliance</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-insider-threats-identity-challenges</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-security-remediation</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/google-workspace-solutions-prevent-account-compromise</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/granular-access-controls-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/harnessing-business-context-to-enable-a-secure-and-productive-workforce</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/harnessing-saas-data-to-automatically-mitigate-security-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-disney-could-have-prevented-its-massive-slack-channel-data-breach-3-actionable-steps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-docontrol-and-google-workspace-ai-labels-solve-for-data-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-docontrol-ensures-the-success-of-your-security-team</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-hr-and-security-teams-can-and-must-work-together-to-stop-insider-threats</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-is-saas-dlp-different-from-traditional-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-the-u-s-department-of-defense-exposed-critical-military-data-via-google-drive-public-sharing</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-to-choose-the-right-saas-dlp-solution</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-to-secure-google-drive</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/how-to-secure-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/identity-new-security-perimeter</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/impact-genai-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/insider-risk-management-security-starts-within</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/insider-risk-management-within-saas-security-stack</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/insider-threat-prevention-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/insider-threats-to-your-saas-data</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/intels-insider-threat-incident</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/is-google-workspace-secure</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/itdr-in-the-saas-environment</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/itdr-mastering-identity-threat-detection-response-2026</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/its-3-30-2023-do-you-know-where-your-data-is</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/its-hard-to-leverage-google-labels-to-prevent-data-loss</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/jaguar-land-rover-data-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/justify-saas-security-investments</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/kraken-insider-incident</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/latest-okta-breach-is-a-wake-up-call-for-saas-data-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/looking-back-and-looking-forward-on-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/managed-data-detection-and-response-mddr</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/mapping-saas-security-alerts-to-mitre-att-ck</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/mercor-data-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/microsoft-365-copilot-security-risks-echoleak</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/microsoft-365-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/microsoft-casb</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/microsoft-insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/microsoft-security-incident</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/migrating-microsoft-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/mitre-attack-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/modernizing-dlp-and-casb-with-docontrol</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/monitor-insider-threats-in-saas-tools</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/native-saas-security-features-not-granular-enough-to-solve-common-business-use-cases</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/oauth-access-unauthorized-apps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/oauth-saas-applications-discover-correlate-remediate-repeat</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/okta-businesses-at-work-extending-identity-security-further-down-the-stack</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/palantir-former-employees-steal-company-data</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/popular-workflow-use-cases</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/prevent-oversharing-sensitive-documents-saas</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/preventing-sensitive-saas-data-loss-through-regex-scans</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/protect-your-google-workspace-with-docontrol-api-casb</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/proxying-your-way-to-saas-security-theres-a-better-approach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/public-sharing-google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/rogue-api-key</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/rogue-chrome-extension-exploits-api-keys-google-drive</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/rsa-conference-rsac-2023-a-docontrol-recap</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-access-control-and-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-asset-management-the-first-step-in-protecting-your-organization</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-data-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-data-exposure-saas-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-data-protection</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-data-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-data-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-data-sprawl</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-ecosystem-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-identity-risk-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-best-practices-2026</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-checklist</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-cloud-computing</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-data-identity-ai-approach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-platform-ssp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-posture-management-sspm-for-enterprises</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-trends</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-vs-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-why-standard-data-security-doesnt-work-for-saas-apps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saas-security-why-the-time-to-act-is-now</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/saassecurity-vs-cloudsecurity-key-differences</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/salesforce-customers-gainsight-third-party-vendor-data-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/salesforce-experience-cloud-attack</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/salesforce-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/salesloft-drift-breach-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/scale-ai-incident-google-workspace-data-risk</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/scaling-our-organization-to-meet-customer-demand</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/secure-cloud-collaboration</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/secure-file-sharing-business</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/secure-remote-work</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/secure-your-google-workspace-environment</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/securing-google-workspace-after-migrating-from-microsoft-365-how-docontrol-can-help</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/securing-your-data-amidst-threats-insights-from-the-dropbox-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/security-risks-vibe-coding</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sensitive-data-discovery-tools</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sensitive-files-publicly-shared</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/shadow-ai-tools-in-saas-environments</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/shadow-applications-a-significant-risk-hidden-in-plain-sight</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/shadow-apps-google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/shadow-it-vs-shadow-apps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/shinyhunters</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/simplifying-saas-data-access-governance-a-guide</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/slack-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/slack-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/slack-dlp-partners</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/slack-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/slack-security-concerns</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/soc-2-fraud-scheme-google-drive-link-exposed</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sspm</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sspm-bad-actors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sspm-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sspm-casb</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sspm-configuration-drift</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/sspm-vs-casb</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/stop-compromised-account-attacks-in-saas</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/storing-sensitive-data-on-google-drive</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/strac-vs-docontrol</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/the-3-types-of-data-breaches-and-their-dangerous-impact-on-your-data</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/the-end-of-aws-keys-in-slack-channels</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/the-hidden-holes-in-your-idp-offboarding-process</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/the-saas-security-market-what-to-expect-in-2023</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/the-saas-security-threat-landscape-data-report-modern-businesses-are-struggling-to-grapple-with-saas-risk-exposure</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/the-top-10-saas-data-access-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-appomni-competitors-and-alternatives</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-bettercloud-competitors-alternatives</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-metomic-alternatives-and-competitors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-netskope-alternatives-and-competitors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-nightfall-alternatives-and-competitors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-obsidian-competitors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-saas-security-sspm-vendors-of-2026</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-saas-security-trends-2026</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-10-valence-alternatives-and-competitors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-dlp-vendors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-saas-security-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/top-security-budget-allocations-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/tsmcs-insider-risk-crisis</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/ubers-internal-network-breach-and-business-critical-saas-data-compromise</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/user-behavior-google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/varonis-alternatives-and-competitors</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/vercel-data-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/weather-forecast-cloudy-with-high-chances-of-saas-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-aws-appfabric-means-for-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-can-happen-when-you-enforce-multi-factor-authentication-but-your-collaborators-dont</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-enterprise-browsers-miss-data-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-google-apps-manager-gam-can-and-cant-do-for-your-google-workspace-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-is-a-casb-and-how-does-it-integrate-with-dlp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-is-a-saas-security-platform-ssp</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-is-google-drive-encryption</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-is-moltbot</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-is-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-is-saas-security-defining-an-evolving-marketing-and-providing-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-nist-sp-800-207-means-for-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/what-oktas-business-at-work-report-means-for-your-saas-security-program</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/whats-missing-from-annual-security-awareness-training</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/why-data-security-is-critical-now-more-than-ever</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/why-docontrol-outshines-netskope-in-saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/why-google-enterprise-isnt-enough-for-shadow-apps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/why-is-sensitive-data-overexposed-in-google-drive</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/workday-breach</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/yet-another-major-supply-chain-attack-github</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/your-3rd-party-collaborators-share-your-company-data-with-4th-parties</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/zero-trust-data-access</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/zoom-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/blog/zoom-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/data-loss-prevention</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/identity-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/identity-threat-detection-and-response-itdr</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/insider-risk-management</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/saas-security</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/saas-security-posture-management-sspm</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/shadow-apps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/glossary/what-is-an-insider-threat</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/activefence</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/carta</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/cybersixgill</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/data-security-fintech-case-study</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/devo</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/docontrol-k-12-schools-data-security-programs</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/how-bulk-remediation-of-overexposed-data-assets-saved-imubit-450-hours-of-manual-work</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/how-justt-saved-2-240-hours-of-manually-remediating-overexposed-saas-assets</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/intango</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/liquidity-group</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/minted</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/natural-intelligence</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/samsungnext</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/similarweb</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/sisense</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/stackadapt</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/syte</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/unqork</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/case-studies/vox-media</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/2025-saas-data-exposure-infographic</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/a-guide-to-saas-security-key-approaches-and-best-practices</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/dlp-in-2025</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/explore-vital-insights-in-our-2023-data-report-to-gain-valuable-knowledge-about-current-saas-data-security-trends-best-practices-and-more</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/gemini-google-workspace</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/how-to-implement-comprehensive-google-workspace-security-with-docontrol</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/idc-ps</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/omdia-on-the-radar-report</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/saas-data-risks</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/sharing-assets-in-corporate-saas-a-guide-to-ensuring-data-security-with-docontrol</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/the-cisos-guide-to-selecting-a-casb-solution</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/the-cisos-sspm-scorecard-assess-your-saas-security-posture-and-what-you-need-to-improve-it</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/the-practical-guide-to-saas-security-in-the-era-of-generative-ai-risks-and-remediations</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/the-state-of-saas-data-security-2024</loc>
    </url>
    <url>
        <loc>https://www.docontrol.io/research-and-guides/the-top-4-threats-navigating-saas-data-security-challenges-in-2024</loc>
    </url>
</urlset>