<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.resultex.co.nz/cloud-security-gallery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-12-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a20d695f9619acc4f5753a4/1512684548577/shadowIT.png</image:loc>
      <image:title>Cloud Security Gallery - Shadow IT</image:title>
      <image:caption>Shadow IT NZ organisations typically use 25-80 new cloud services every week!   Relying on manual intervention means you will always be playing 'catch-up'.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a20d766419202d582acc945/1512684572106/cloud+apps.png</image:loc>
      <image:title>Cloud Security Gallery - Security and Control</image:title>
      <image:caption>Security and Control Once your data leaves your premises, few of your normal security controls will work. You need different controls for data once it is in the cloud.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a20d7e8e4966be2ad7bee59/1512684612700/cloud+governance-blue.jpg</image:loc>
      <image:title>Cloud Security Gallery - Cloud Governance</image:title>
      <image:caption>Cloud Governance Governing Cloud is like painting a bridge – once finished you have to start again. Not only is this true of Cloud, but just when you think you have Cloud under control, it has grown.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a271720c8302549a34dab43/1512684560512/sactioned+cloud.jpg</image:loc>
      <image:title>Cloud Security Gallery - Sanctioned Cloud</image:title>
      <image:caption>Sanctioned Cloud Sanctioned Cloud services are the ones where you want your users to put your enterprise data.  Especially if your enterprise has a “Cloud First” strategy.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a29bc44ec212d8a5ae26733/1512684548577/</image:loc>
      <image:title>Cloud Security Gallery - Shadow IT</image:title>
      <image:caption>Shadow IT NZ organisations typically use 25-80 new cloud services every week!   Relying on manual intervention means you will always be playing 'catch-up'.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/identity-gallery</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-12-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a273d9e53450a69fbcda52a/1512611923435/single+sign-on.jpg</image:loc>
      <image:title>Identity Gallery - Single Sign-On</image:title>
      <image:caption>Single Sign-On Once enterprise data extends into the Cloud, providing secure access to it is fundamental.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288bceec212d1d0861e0a2/1512612085767/universal-directory.jpg</image:loc>
      <image:title>Identity Gallery - Universal Directory</image:title>
      <image:caption>Universal Directory No-one seems to have just one identity store. Okta allows you to control your identities from once place.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288c24652deabe5e204787/1512612800944/multifactor-authentication.jpg</image:loc>
      <image:title>Identity Gallery - Multi-Factor Authentication</image:title>
      <image:caption>Multi-Factor Authentication Do you get the feeling that the bad guys may be smarter than the good guys?  With almost all passwords vulnerable to brute force attacks, Multi-Factor’s time has come.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288cbdec212d1d0862095d/1512615446523/lifecycle-management.jpg</image:loc>
      <image:title>Identity Gallery - Okta Lifecycle Management</image:title>
      <image:caption>Okta Lifecycle Management With many identity stores in an organisation where is the single source of identity “truth”?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288d1b24a6942a95ad2d4f/1512685445642/okta-mobility.jpg</image:loc>
      <image:title>Identity Gallery - Okta Mobility Management</image:title>
      <image:caption>Okta Mobility Management Manage mobile devices, applications and data and who can share what with whom.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288d63652deabe5e207eca/1512685740675/permission.jpg</image:loc>
      <image:title>Identity Gallery - User Provisioning/De-Provisioning</image:title>
      <image:caption>User Provisioning/De-Provisioning Many organisations copy an existing employee’s access rights for a new employee, which leads to "credential creep".</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a29c0ac652dea577a8b97ee/1512611923435/</image:loc>
      <image:title>Identity Gallery - Single Sign-On</image:title>
      <image:caption>Single Sign-On Once enterprise data extends into the Cloud, providing secure access to it is fundamental.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/cloud-security-summary</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-12-14</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29b9d38165f50aadf69736/5a29b9ec24a694ab6f259a87/1512684180255/shadow_walk.jpg</image:loc>
      <image:title>Cloud Security Summary - Shadow IT</image:title>
      <image:caption>Experience shows that business or government users typically put data into 10x more cloud services that you think, spread across at least 25 geographies. This is where they place their employers' data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29b9d38165f50aadf69736/5a29ba52e2c483d49a411760/1513212748667/sactioned+cloud.jpg</image:loc>
      <image:title>Cloud Security Summary - Sanctioned Cloud</image:title>
      <image:caption>With over 25,000 available Cloud Services, which ones are good enough to hold our important data? Once you work this out, having users NOT use the other services is a formidable challenge.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29b9d38165f50aadf69736/5a29ba9e9140b7f2505057f2/1512684234950/cloud+apps.png</image:loc>
      <image:title>Cloud Security Summary - Security and Control</image:title>
      <image:caption>Today it is almost impossible NOT to use Cloud Services. So how do you choose the right services and how do you keep your data that finds its way into the cloud SAFE?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29b9d38165f50aadf69736/5a29bad50852294a5ff4fe4d/1512684297001/cloud+governance-blue.jpg</image:loc>
      <image:title>Cloud Security Summary - Cloud Governance</image:title>
      <image:caption>Users embrace new cloud services with the drop of a hat. There is likely to be 1000’s of cloud services in use within your organisation. How do you choose the right services and how do you keep your data that finds its way into the cloud SAFE?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a31cb4cf9619aebe04b1c82/1512684180255/</image:loc>
      <image:title>Cloud Security Summary - Shadow IT</image:title>
      <image:caption>Experience shows that business or government users typically put data into 10x more cloud services that you think, spread across at least 25 geographies. This is where they place their employers' data.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/identity-summary</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-12-11</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c1179140b7347083ebfa/1512685881818/finger-2081169_1280.jpg</image:loc>
      <image:title>Identity Summary - Single Sign-On</image:title>
      <image:caption>As user activity and enterprise data extends outside the enterprise, providing secure access to it is critical and fundamental.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c143ec212dc43d126c92/1512685921185/universal-directory.jpg</image:loc>
      <image:title>Identity Summary - Universal Directory</image:title>
      <image:caption>No-one seems to have a single Identity store these days. However it can be very difficult to remove such a store. Okta allows you to control your identities from once place.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c16d0852294a5ff6b096/1513030452919/multifactor-authentication.jpg</image:loc>
      <image:title>Identity Summary - Multi-Factor Authentication</image:title>
      <image:caption>Today it is almost impossible NOT to use Cloud Services. So how do you choose the right services and how do you keep your data that finds its way into the cloud SAFE?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c1a553450a0efc799ae6/1513030452840/lifecycle-management.jpg</image:loc>
      <image:title>Identity Summary - Okta Lifecycle Management</image:title>
      <image:caption>With many identity sources in your origination, where is your single source of identity “truth” and how do you ensure consistency?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c1c8c83025c3e2b2ab02/1513030452827/okta-mobility.jpg</image:loc>
      <image:title>Identity Summary - Okta Mobility Management</image:title>
      <image:caption>With OMM you can manage mobile devices, applications and data and who can share what with whom.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c1e453450a0efc79ab79/1513030453006/permission.jpg</image:loc>
      <image:title>Identity Summary - User Provisioning/De-Provisioning</image:title>
      <image:caption>Don’t be one of those organisations copy an existing employee’s access rights for a new employee. When someone leaves, relying on someone to immediately cancel their access from all your identity stores can be unrealistic.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c1e224a694eabe090cee/1513030452999/</image:loc>
      <image:title>Identity Summary</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a29c1020d929778046b563c/5a29c16c24a694eabe08efcd/1512685932157/</image:loc>
      <image:title>Identity Summary</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a2f033553450a5ec1c716e2/1512685881818/</image:loc>
      <image:title>Identity Summary - Single Sign-On</image:title>
      <image:caption>As user activity and enterprise data extends outside the enterprise, providing secure access to it is critical and fundamental.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/welcome</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-11-27</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5dddeb0ba6666154ca86b5ab/1574824724989/RightPeople_Button.png</image:loc>
      <image:title>Welcome - Resultex people are a group of qualified passionate consultants with a range of expertise in their fields.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5dddeae4f7612e3d7b69e6fb/1574824686070/CloudSecurity_Button.png</image:loc>
      <image:title>Welcome - Reduce risk with a cloud based multi-tenant managed service.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5dddeb20499be068a55ef4f6/1574824746475/Identity%26AccessMgmt_Button.png</image:loc>
      <image:title>Welcome - NO.1 In Identity and Access Management.</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5dddbff4a6666154ca816b77/1574813727099/SharleneWGTN.JPG</image:loc>
      <image:title>Welcome</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/contracting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-01-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/59f0439051a584527a9d2155/1509005862634/hero-3.jpg</image:loc>
      <image:title>Contracting</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2018-02-15</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a0a5592e2c483d6cbd190c8/5a1e522de2c483f5ad85fcac/1513221818558/identity_passport.jpg</image:loc>
      <image:title>Home</image:title>
      <image:caption>IDENTITY MANAGEMENT</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a0a5592e2c483d6cbd190c8/5a1c907be4966b134242698d/1513222049517/Resultx-Home.png</image:loc>
      <image:title>Home</image:title>
      <image:caption>RESULTEX Delivering successful ICT outcomes "Resultex were effective, pragmatic and understood Landcorp’s requirements resulting in an excellent ISSP for Landcorp to take forward". — Richard Perry, Landcorp</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a0a5592e2c483d6cbd190c8/5a178737e4966b134297a87b/1513221792397/Contracting.jpg</image:loc>
      <image:title>Home</image:title>
      <image:caption>CONTRACTING</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a0a5592e2c483d6cbd190c8/5a17873624a694106d2a580d/1513221782034/Consulting.jpg</image:loc>
      <image:title>Home</image:title>
      <image:caption>CONSULTING</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a0a5592e2c483d6cbd190c8/5a178735c83025aa86ff06f8/1513221806614/Cloud+Security.jpg</image:loc>
      <image:title>Home</image:title>
      <image:caption>CLOUD SECURITY</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/about-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-12-12</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a0dfd6771c10b0bb0b08bf4/1490235341769/hero-4.jpg</image:loc>
      <image:title>About us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/cloud-security-products</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-12-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a271720c8302549a34dab43/1512684560512/sactioned+cloud.jpg</image:loc>
      <image:title>Cloud Security Products - Sanctioned Cloud</image:title>
      <image:caption>Sanctioned Cloud Sanctioned Cloud services are the ones where you want your users to put your enterprise data.  Especially if your enterprise has a “Cloud First” strategy.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a20d695f9619acc4f5753a4/1512684548577/shadowIT.png</image:loc>
      <image:title>Cloud Security Products - Shadow IT</image:title>
      <image:caption>Shadow IT NZ organisations typically use 25-80 new cloud services every week!   Relying on manual intervention means you will always be playing 'catch-up'.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a20d7e8e4966be2ad7bee59/1512684612700/cloud+governance-blue.jpg</image:loc>
      <image:title>Cloud Security Products - Cloud Governance</image:title>
      <image:caption>Cloud Governance Governing Cloud is like painting a bridge – once finished you have to start again. Not only is this true of Cloud, but just when you think you have Cloud under control, it has grown.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a20d66a9140b77b549b9598/5a20d766419202d582acc945/1512684572106/cloud+apps.png</image:loc>
      <image:title>Cloud Security Products - Security and Control</image:title>
      <image:caption>Security and Control Once your data leaves your premises, few of your normal security controls will work. You need different controls for data once it is in the cloud.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/consulting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a27046824a69403cbd706bd/1509005862634/hero-3.jpg</image:loc>
      <image:title>Consulting</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/identity-products</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-12-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288d63652deabe5e207eca/1512685740675/permission.jpg</image:loc>
      <image:title>Identity Products - User Provisioning/De-Provisioning</image:title>
      <image:caption>User Provisioning/De-Provisioning Many organisations copy an existing employee’s access rights for a new employee, which leads to "credential creep".</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288d1b24a6942a95ad2d4f/1512685445642/okta-mobility.jpg</image:loc>
      <image:title>Identity Products - Okta Mobility Management</image:title>
      <image:caption>Okta Mobility Management Manage mobile devices, applications and data and who can share what with whom.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288cbdec212d1d0862095d/1512615446523/lifecycle-management.jpg</image:loc>
      <image:title>Identity Products - Okta Lifecycle Management</image:title>
      <image:caption>Okta Lifecycle Management With many identity stores in an organisation where is the single source of identity “truth”?</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288c24652deabe5e204787/1512612800944/multifactor-authentication.jpg</image:loc>
      <image:title>Identity Products - Multi-Factor Authentication</image:title>
      <image:caption>Multi-Factor Authentication Do you get the feeling that the bad guys may be smarter than the good guys?  With almost all passwords vulnerable to brute force attacks, Multi-Factor’s time has come.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a288bceec212d1d0861e0a2/1512612085767/universal-directory.jpg</image:loc>
      <image:title>Identity Products - Universal Directory</image:title>
      <image:caption>Universal Directory No-one seems to have just one identity store. Okta allows you to control your identities from once place.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/5a2739da8165f51cb87d8cfc/5a273d9e53450a69fbcda52a/1512611923435/single+sign-on.jpg</image:loc>
      <image:title>Identity Products - Single Sign-On</image:title>
      <image:caption>Single Sign-On Once enterprise data extends into the Cloud, providing secure access to it is fundamental.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/shadow-it</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a2f4583c830253615b8421c/1513048043901/shadow_walk.jpg</image:loc>
      <image:title>Shadow IT</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/sanctioned-cloud</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a2f484aec212d83c893a835/1513048590652/sactioned+cloud.jpg</image:loc>
      <image:title>Sanctioned Cloud</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/security-and-control</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a2f4ad153450aa14296bc08/1513049723703/cloud+apps.png</image:loc>
      <image:title>Security and Control</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/cloud-governance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a2f4ee8e2c48396fe014116/1513049837633/cloud+governance-blue.jpg</image:loc>
      <image:title>Cloud Governance</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/single-sign-on</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a301d71652dea3823a0da27/1513103270323/single+sign-on.jpg</image:loc>
      <image:title>Single Sign-On</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/universal-directory</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-09</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a30215b53450af01ffe7f54/1513103861047/multifactor-authentication.jpg</image:loc>
      <image:title>Universal Directory</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/multi-factor-authentication</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-01-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a3021f541920204e49556bc/1513103709858/multifactor-authentication.jpg</image:loc>
      <image:title>Multi-Factor Authentication</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/okta-lifecycle-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-01-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a3024350d9297e3b10dd5f1/1513104886632/lifecycle-management.jpg</image:loc>
      <image:title>Okta Lifecycle Management</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/okta-mobility-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-01-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a30265c41920204e4965732/1513105397306/okta-mobility.jpg</image:loc>
      <image:title>Okta Mobility Management</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.resultex.co.nz/user-provisioning-de-provisioning</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-01-07</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/5898fa55f7e0abb25ad6f38d/t/5a302856ec212d72e62330b5/1513105498421/permission.jpg</image:loc>
      <image:title>User Provisioning/De-Provisioning</image:title>
    </image:image>
  </url>
</urlset>

