<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://krontech.com/2020-de-one-cikan-veri-ihlali-sorunlari</loc><lastmod>2021-01-08</lastmod></url><url><loc>https://krontech.com/2021-de-sikca-duyulacak-siber-guvenlik-trendleri</loc><lastmod>2021-04-25</lastmod></url><url><loc>https://krontech.com/en/2021-gartner-magic-quadrant-for-pam-recognizes-kron-as-a-niche-player-once-again</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/2021-yilinda-en-sik-karsilasilan-siber-saldiri-turleri</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/2021de-dikkat-edilmesi-gereken-5-guvenlik-yonetimi-trendi</loc><lastmod>2020-11-21</lastmod></url><url><loc>https://krontech.com/2022-de-dikkat-edilmesi-gereken-siber-guvenlik-trendleri</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/2023-te-dikkat-edilmesi-gereken-siber-guvenlik-trendleri</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/2023-yilinda-kisisel-veri-kanunlari-dunya-nufusunun-yuzde-75ini-kapsayacak</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/en/2026-cybersecurity-predictions-why-kron-pam-and-kron-dam-ddm-sit-at-the-center</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/2026-siber-guvenlik-ongoruleri-kron-pam-ve-kron-dam-ddm-neden-merkezde</loc><lastmod>2026-01-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/33-password-statistics-you-need-to-know-for-your-cyber-security</loc><lastmod>2023-04-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/5-cybersecurity-questions-boards-should-contemplate</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/5-differences-between-data-security-and-data-privacy</loc><lastmod>2021-01-31</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/5-ipucu-ile-sirketinizde-veri-ihlalini-onleyin</loc><lastmod>2021-01-10</lastmod></url><url><loc>https://krontech.com/en/5-tips-to-prevent-a-data-breach-at-your-company</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/5g-doneminde-siber-tehditler-artisa-gecebilir</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/5g-doneminde-siber-tehditlere-karsi-hazirlikli-olmak</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/7-administrative-accounts-you-should-definitely-secure</loc><lastmod>2023-06-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/7-basic-steps-to-identify-a-data-breach</loc><lastmod>2026-03-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/8-cybersecurity-myths-vs-facts</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/8-siber-guvenlik-efsanesi-ve-gercekler</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/9-adimda-ag-altyapisi-izleme-nasil-iyilestirilir</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/9-akilci-adimla-guvenliginizi-iyilestirin</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/en/a-first-in-the-world-from-kron-and-vodafone-business-partnership</loc><lastmod>2022-09-01</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/a-new-level-of-granularity-for-access-management-privileged-task-automation</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/a-passwordless-future-is-getting-closer-and-closer</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/aaa</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/aaa-authentication-authorization-accounting-nedir</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/en/aaa-how-it-works</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/aaa-key-benefits</loc><lastmod>2023-04-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/aaa-resources</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ab-abd-veri-paylasim-anlasmasi-anlasma-saglandi-mi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/about-us</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/account-executive-central</loc><lastmod>2024-10-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/account-executive-east</loc><lastmod>2024-10-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/account-executive-west</loc><lastmod>2024-10-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/achieving-gdpr-compliance-with-kron-pam</loc><lastmod>2024-08-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/acik-pozisyonlar</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/en/act-before-it-is-too-late</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/adding-database-firewall-and-dynamic-data-masking</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ag-cihazlarina-erisim-kontrolunu-yeniden-ele-alin-ag-altyapisi-icin-pam-yaklasimi</loc><lastmod>2025-05-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ag-dayanikliligi-nedir-ve-nasil-elde-edilir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ag-izleme-network-monitoring-nedir-neden-onemlidir</loc><lastmod>2021-06-15</lastmod></url><url><loc>https://krontech.com/ag-performans-izleme-nedir-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ag-performans-metrikleri-izlenmesi-gereken-5-temel-ag-metrigi</loc><lastmod>2022-02-07</lastmod></url><url><loc>https://krontech.com/ahmed-mohieeldin</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ahmet-cemal-akgun</loc><lastmod>2023-11-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ahmet-cemal-akgun</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/akilli-sehirler-ve-ag-altyapi-izleme</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/akilli-sehirler-ve-siber-guvenlik</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/akin-kucuk</loc><lastmod>2022-08-31</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/akin-kucuk</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/akin-kucuk_</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/alexey-mochalin</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ali-orkun-dumurcakli</loc><lastmod>2024-09-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ali-orkun-dumurcakli</loc><lastmod>2024-09-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/anadolu-efes-in-veri-ve-erisim-guvenligi-kron-urunleriyle-saglanacak</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com</loc><lastmod>2022-11-24</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/announcements</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/arama</loc><lastmod>2020-11-24</lastmod></url><url><loc>https://krontech.com/en/as-data-security-and-privacy-regulations-tighten-governance-solutions-are-growing</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/as-the-utility-grid-merges-with-communications-networks-the-air-gap-my-not-protect-critical-assets</loc><lastmod>2023-05-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/audit-and-regulatory-compliance</loc><lastmod>2023-10-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/available-positions</loc><lastmod>2021-01-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/awards</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/aydinlatma-beyani</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/ayricaliklarin-kotuye-kullanimi-nasil-engellenir</loc><lastmod>2022-10-05</lastmod></url><url><loc>https://krontech.com/ayricalikli-erisim-guvenligi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayricalikli-erisim-guvenligi-brosurleri</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayricalikli-erisim-guvenligi-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayricalikli-erisim-guvenligi-urun-ailesi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayricalikli-erisim-yonetimi-cozumune-sahip-olmamanin-getirdigi-zorluklar</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayricalikli-erisim-yonetimi-pam-nedir</loc><lastmod>2021-04-25</lastmod></url><url><loc>https://krontech.com/ayricalikli-erisim-yonetiminde-dikkat-edilmesi-gerekenler</loc><lastmod>2021-04-04</lastmod></url><url><loc>https://krontech.com/ayricalikli-erisim-yonetiminde-kacinilmasi-gereken-hatalar</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayricalikli-erisiminizi-guvence-altina-alin-ibmin-2024-cost-of-a-data-breach-raporundan-icgoruler</loc><lastmod>2024-08-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayricalikli-gorev-otomasyonu-nedir-nasil-calisir</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/ayricalikli-hesap-guvenligine-neden-oncelik-vermelisiniz</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/ayricalikli-hesap-sifre-guvenligi-nasil-saglanir</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/ayricalikli-hesaplar-en-degerli-varliklariniz-siber-saldirilarin-en-buyuk-hedefleri</loc><lastmod>2021-06-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ayse-yenel</loc><lastmod>2022-08-31</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayse-yenel</loc><lastmod>2024-12-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayse-yenel_</loc><lastmod>2024-12-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ayse-yenel_</loc><lastmod>2024-12-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ayse-yenel__</loc><lastmod>2024-12-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/azure-bulut-ortamini-pam-ile-daha-guvenli-hale-getirmek</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/bagimsiz-denetci</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bagis-ve-yardim-politikasi</loc><lastmod>2020-10-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/baran-barut</loc><lastmod>2023-11-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/baran-barut</loc><lastmod>2024-08-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/berkay-meker</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/berkay-meker</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/best-alternative-to-cisco-acs</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/beyond-admin-rights-how-kron-pam-s-endpoint-privilege-management-strengthens-enterprise-security</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/beyond-passwords-how-kron-pams-mfa-fortifies-your-enterprise-against-modern-threats</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bilgi-guvenligi-infosec-nedir</loc><lastmod>2022-08-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bilgi-guvenligi-politikamiz</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/bilgilendirme-politikasi</loc><lastmod>2021-01-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bilisim500de-veri-guvenligi-yazilimi-kategorisinde-dorduncu-kez-1-olduk</loc><lastmod>2024-08-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/binlerce-katilimin-oldugu-black-hat-meada-siber-guvenlik-profesyonelleriyle-bir-araya-geldik</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/black-hat-meada-bize-katilin</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/blackhat-mea</loc><lastmod>2025-10-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/blog</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/en/blog</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/board-of-directors</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bora-donmez</loc><lastmod>2024-09-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/bora-donmez</loc><lastmod>2024-09-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/borsa-aciklamalari</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/borsa-duyurulari</loc><lastmod>2020-12-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bronz-sponsor-oldugumuz-black-hat-meada-is-ortaklarimiz-ve-musterilerimizle-bulustuk</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/bsi-grundschutz-it-baseline-protection-and-pam</loc><lastmod>2022-12-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bulut-guvenliginde-ayricalikli-erisim-yonetimi</loc><lastmod>2021-04-11</lastmod></url><url><loc>https://krontech.com/bulut-guvenliginde-siber-risklerin-onune-gecmenin-ilk-adimi</loc><lastmod>2022-08-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/bulut-saldiri-vektorlerini-ayricalikli-erisim-yonetimi-ile-onlenme-yontemleri</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/buyuk-kurumlarin-log-yonetim-zorluklari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/can-your-business-afford-not-implementing-a-pam-solution</loc><lastmod>2022-12-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/canel-gurgen-arcak</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/canel-gurgen-arcak</loc><lastmod>2022-08-31</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/caner-altuntas</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cansu-sonmez</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/careers</loc><lastmod>2022-12-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/case-studies</loc><lastmod>2022-11-24</lastmod></url><url><loc>https://krontech.com/en/case-studies</loc><lastmod>2022-12-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cengizhan-canli</loc><lastmod>2026-02-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cengizhan-canli</loc><lastmod>2026-02-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cerez-politikasi</loc><lastmod>2020-12-14</lastmod></url><url><loc>https://krontech.com/en/cisco-cpar-is-about-to-expire-how-to-move-on</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cisco-cpar-kullanim-omrunun-sonuna-geldi-kron-aaae-gecis-yapmanin-tam-zamani</loc><lastmod>2024-12-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cisco-cpar-kullanim-omrunun-sonuna-yaklasiyor-simdi-ne-yapmali</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ck-enerji-ve-istirakleri-kron-single-connect-i-tercih-etti</loc><lastmod>2021-02-18</lastmod></url><url><loc>https://krontech.com/en/cloud-attacks-are-up-fivefold-are-you-prepared</loc><lastmod>2025-04-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cloud-computing-friend-or-foe</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cloud-entitlement-management-a-critical-layer-in-modern-cloud-security</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cloudpam</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cloudpam-how-it-works</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cloudpam-key-benefits</loc><lastmod>2024-07-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cloudpam-product-family</loc><lastmod>2024-07-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cloudpam-resources</loc><lastmod>2024-07-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cok-asamali-kimlik-dogrulama</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cok-asamali-kimlik-dogrulama-faydalari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cok-asamali-kimlik-dogrulama-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cok-asamali-kimlik-dogrulama-urun-ailesi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cok-faktorlu-kimlik-dogrulama-kaynak-dokumanlar</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cok-faktorlu-kimlik-dogrulama-nedir-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/collaboration-between-kron-and-bulutistan</loc><lastmod>2024-12-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/coming-in-first-gartner-says-pam-should-be-the-top-priority-for-cisos</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/common-cloud-security-risks</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/contact</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/control-your-data-control-your-destiny</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cookie-policy</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cooperation-between-isbank-and-kron</loc><lastmod>2022-09-09</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cooperation-for-cyber-security-between-kron-and-havelsan</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/cost-of-a-data-breach-2022-raporunda-one-cikan-basliklar</loc><lastmod>2022-10-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/covid-19-doneminde-temel-gizliligi-korumanin-yollari</loc><lastmod>2020-12-20</lastmod></url><url><loc>https://krontech.com/en/cyber-attackers-exploit-people-not-technology-why-data-security-in-enterprises-depends-on-human-behavior</loc><lastmod>2023-05-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cyber-attacks-throw-one-fifth-of-businesses-in-europe-and-the-us-into-bankruptcy</loc><lastmod>2023-04-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cyber-insecurity-in-a-fractured-world-why-privileged-access-has-become-a-strategic-risk</loc><lastmod>2026-01-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cyber-security-from-a-to-z-for-enterprises</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cyber-security-trends-to-watch-out-for-in-2021</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cyber-threat-readiness-in-the-age-of-5g</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cyber-threats-keep-challenging-the-healthcare-industry</loc><lastmod>2023-07-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cyberattacks-threatening-the-healthcare-industry</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-as-a-strategic-business-decision</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-in-healthcare</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-in-public-institutions</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-in-the-energy-sector</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-in-the-finance-sector</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-in-the-logistics-industry</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-insights-from-cdw-what-enterprise-cisos-need-to-know-about-internal-threats</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-resources</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-risks-that-use-metaverse-as-a-tool</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-trends-to-watch-out-for-in-2022</loc><lastmod>2023-05-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/cybersecurity-trends-to-watch-out-for-in-2023</loc><lastmod>2022-12-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/dagitik-ayricalikli-erisim-yonetiminin-avantajlari-ve-zorluklari-uctan-buluta-kuruluslari-guvende-tutmak</loc><lastmod>2021-05-02</lastmod></url><url><loc>https://krontech.com/en/data-and-access-security-of-anadolu-efes-will-be-supported-with-kron-products</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/data-breach-reveals-security-risks-for-chatgpt</loc><lastmod>2023-05-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/data-masking-for-more-secure-networks-and-stronger-compliance</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/data-rehydration</loc><lastmod>2024-05-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/data-security-data-management</loc><lastmod>2022-11-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/database-access-manager</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/database-access-manager-how-it-works</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/database-access-manager-key-benefits</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/database-access-manager-product-family</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/database-access-manager-resources</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/database-activity-monitoring</loc><lastmod>2025-02-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/decentralized-privileged-access-management-pam-benefits-and-challenges-keeping-edge-to-cloud-organizations-secure</loc><lastmod>2021-05-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/definition-types-of-insider-threats-in-cyber-security</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/demo-talebi</loc><lastmod>2022-02-23</lastmod></url><url><loc>https://krontech.com/devrim-akpinar</loc><lastmod>2025-08-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/devrim-akpinar</loc><lastmod>2025-08-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/did-zero-trust-kill-defense-in-depth-or-has-defense-in-depth-improved-zero-trust</loc><lastmod>2022-12-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/dijital-cagda-guclu-veri-guvenligi-veritabani-erisim-yonetimi-ve-dinamik-veri-maskeleme-alaninda-uzmanlasmak</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/dijital-donusum-caginda-siber-guvenlige-oncelik-vermek</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/dinamik-bulut-ortamlarinda-ayricalikli-erisim-yonetimi-zorlugunun-cozumu</loc><lastmod>2024-07-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/dinamik-veri-maskeleme</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/dinamik-veri-maskeleme-faydalari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/dinamik-veri-maskeleme-kaynak-dokumanlar</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/dinamik-veri-maskeleme-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/don-t-get-held-hostage-innovations-address-ransomware</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/drowning-in-data-the-log-management-challenges</loc><lastmod>2024-03-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/duyurular</loc><lastmod>2020-11-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/dynamic-data-masking</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/dynamic-data-masking-how-it-works</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/dynamic-data-masking-key-benefits</loc><lastmod>2022-10-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/dynamic-data-masking-resources</loc><lastmod>2023-01-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/elevating-privileged-access-management-with-kron-pam-and-microsoft-entra-id-integration</loc><lastmod>2024-05-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/elif-akbulut</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/empowering-mssps-why-pam-solutions-are-essential</loc><lastmod>2023-05-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/empowering-telco-security-compliance-with-kron-network-pam-understanding-the-telecommunications-security-act-tsa</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/emre-baran</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/emre-baran</loc><lastmod>2025-02-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en-iyi-cisco-acs-alternatifi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en-sik-karsilasilan-10-siber-saldiri-yontemi</loc><lastmod>2021-04-17</lastmod></url><url><loc>https://krontech.com/en/endpoint-privileged-key-benefits</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/endpoint-privileged-management</loc><lastmod>2022-11-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/endpoint-privileged-management-how-it-works</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/endpoint-resources</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/energy</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/enerji</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/enerji-sektorunde-siber-guvenlik</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/enhancing-cybersecurity-with-ai-powered-privileged-access-management</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/enhancing-healthcare-security-with-kron-pam-protecting-patient-data-and-ensuring-compliance</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/enhancing-secure-remote-access-for-it-and-ot-environments</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/enhancing-security-with-kron-pams-multitenancy-a-game-changer-for-large-organizations</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/enhancing-web-application-security-with-kron-pams-web-session-management</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ensuring-enterprise-security-kron-pam-s-strategy-for-managing-and-auditing-privileged-access</loc><lastmod>2024-11-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/enterprise-network-automation-we-can-do-this-the-easy-way-or-the-hard-way</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/epias-in-erisim-guvenligindeki-tercihi-kron-oldu</loc><lastmod>2021-02-18</lastmod></url><url><loc>https://krontech.com/en/equal-employment-opportunity</loc><lastmod>2025-07-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/erhan-yilmaz</loc><lastmod>2024-08-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/erhan-yilmaz</loc><lastmod>2022-08-31</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/erisim-kontrolu-neden-onemlidir</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/esas-sozlesme</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/etik-kurallar</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/en/eu-us-data-sharing-agreement-has-an-agreement-been-reached</loc><lastmod>2023-04-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/evgin-duyarli</loc><lastmod>2026-02-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/evgin-duyarli</loc><lastmod>2026-02-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/exploring-pam-deployment-options-and-choosing-between-saas-and-on-premise-solutions</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/facilitate-regulatory-compliance-with-privileged-access-management</loc><lastmod>2021-06-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/favorite-target-of-ransomware-attacks-ics-networks</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/fidye-yazilim-saldirilari-hiz-kesmeden-suruyor</loc><lastmod>2021-07-08</lastmod></url><url><loc>https://krontech.com/fidye-yazilimi-saldirilari-giderek-artiyor</loc><lastmod>2021-06-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/fidye-yazilimi-saldirilarinin-gozde-hedefi-ics-aglari</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/fidye-yazilimi-saldirilarinin-ransomware-anatomisi</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/fidye-yazilimi-saldirilarinin-yeni-hedefi-orta-olcekli-isletmeler</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/finance</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/financial-results</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/finans</loc><lastmod>2020-11-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/finans-sektorunde-siber-guvenlik</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/firewall-loglarini-kron-telemetry-pipeline-ile-ipdr-a-donusturmek</loc><lastmod>2025-11-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/five-steps-to-protect-privileged-accounts-in-your-organization</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/fortifying-the-frontlines-how-kron-s-database-firewall-stops-threats-in-real-time</loc><lastmod>2025-05-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/four-things-to-consider-about-privileged-access-management</loc><lastmod>2023-06-07</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/from-complexity-to-clarity-a-real-world-pam-transformation-in-just-6-weeks</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/from-hardcoded-passwords-to-secure-secrets-how-a-leading-emea-bank-transformed-security-with-kron-pam</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/from-shadow-accounts-to-secure-vaults-how-kron-pam-simplifies-privileged-account-discovery</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/from-threats-to-trust-kron-pam-s-solution-for-secure-remote-access</loc><lastmod>2025-03-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/fuat-altioglu</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/fuat-altioglu</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/garaj-kurumsal-musterilerin-siber-guvenligini-artirmak-icin-kron-ile-is-ortakligi-kuruyor</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/garaj-partners-with-kron-technologies-to-boost-cybersecurity-of-enterprise-customers</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/gartner-ayricalikli-erisim-yonetimi-nin-ciso-lar-icin-oncelik-olmasi-gerektigini-soyledi</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/gartnerin-2023-2025-icin-8-siber-guvenlik-tahmini</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/en/gartners-8-cybersecurity-predictions-for-2023-2025</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/gdpr-ve-kvkk-doneminde-veri-guvenligine-hazir-misiniz</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/gelecegin-guvenligi-kron-aaa-ile-coklu-avp-kontrolu</loc><lastmod>2025-11-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/genel-kurullar</loc><lastmod>2021-01-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/gercek-zamanli-veri-isleme-nedir-neden-onemlidir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/gisec-global</loc><lastmod>2025-04-16</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/gitex-global-2023-te-bulusalim</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/gizlilik-politikasi</loc><lastmod>2020-12-14</lastmod></url><url><loc>https://krontech.com/en/global-risks-report-and-cybersecurity-overview</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/global-yazilim-devleri-kron-un-abd-deki-girisimi-ironsphere-i-tercih-ediyor</loc><lastmod>2021-02-19</lastmod></url><url><loc>https://krontech.com/golge-it-nin-olusturdugu-riskler-ve-onleme-yontemleri</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/en/government</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/gunumuzun-en-iyi-bes-guvenlik-yonetisimi-metodu</loc><lastmod>2022-08-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/guvenli-uzaktan-erisim-nasil-saglanir</loc><lastmod>2021-06-19</lastmod></url><url><loc>https://krontech.com/guvenliginiz-icin-bilmeniz-gereken-33-parola-istatistigi</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/haberler</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/hakan-otal</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/hakan-otal</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/hakkimizda</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/halka-arz-bilgileri</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/hasan-onur-karaca</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/hassas-veri-turleri-nelerdir-nasil-korunabilirler</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/hassas-verileri-guvende-tutmanin-yollari</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/highlights-from-verizons-dbir-report-2022</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/highlights-of-the-2022-cost-of-a-data-breach-report</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-comprehensive-is-your-pam-solution-how-secure-is-your-infrastructure</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-edge-computing-will-drive-new-demands-for-data-security-infrastructure-integrity-and-new-it-policies</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-kron-network-pam-scaled-network-management-for-200000-devices-and-5000-tps</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-kron-telemetry-pipeline-transforms-kubernetes-logging</loc><lastmod>2025-12-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-apply-the-zero-trust-approach-with-pam</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-create-a-data-security-plan-for-companies</loc><lastmod>2021-02-07</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-ensure-privileged-account-password-security</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-migrate-to-kron-aaa-cisco-cpar-is-eol</loc><lastmod>2024-12-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-prepare-for-a-cybersecurity-audit-tips-and-best-practices</loc><lastmod>2023-05-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-prevent-privilege-misuse</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-protect-against-credential-theft-with-pam</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-protect-your-company-against-supply-chain-attacks</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-provide-secure-remote-access</loc><lastmod>2021-06-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/how-to-reduce-data-breach-detection-time-with-pam-solutions</loc><lastmod>2023-02-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/human-error-to-intentional-misdeeds-from-downtime-to-disaster</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/human-resources</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ic-tehditleri-ayricalikli-erisim-yonetimi-ile-azaltmanin-yollari</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/iceriden-gelen-riskleri-engellemenin-yolu-empati</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/icsel-bilgilere-erisimi-olanlar</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/identity-access-management</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iki-faktorlu-kimlik-dogrulama</loc><lastmod>2022-04-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iki-faktorlu-kimlik-dogrulama-faydalari</loc><lastmod>2022-04-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iki-faktorlu-kimlik-dogrulama-kaynak-dokumanlar</loc><lastmod>2022-04-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iki-faktorlu-kimlik-dogrulama-nasil-calisir</loc><lastmod>2022-04-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iki-faktorlu-kimlik-dogrulama-nedir-nasil-calisir</loc><lastmod>2022-08-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iki-faktorlu-kimlik-dogrulama-urun-ailesi</loc><lastmod>2022-04-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iletisim</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/importance-of-security-in-cyber-physical-systems</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/important-data-breach-issues-in-2020</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/improve-your-network-infrastructure-in-9-steps</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/in-a-multi-cloud-world-it-s-time-to-rethink-who-has-access-to-what</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/information-note</loc><lastmod>2026-03-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/infrastructure-mgmt-operation</loc><lastmod>2022-11-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/insan-kaynaklari</loc><lastmod>2025-07-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/insan-kaynaklari-politikasi</loc><lastmod>2020-10-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/insider-threat-protection</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/investor-presentations</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/investor-relations</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iot-aglarinda-olceklenebilir-guvenlik</loc><lastmod>2022-08-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ipdr-logging</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ipdr-logging_</loc><lastmod>2024-05-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ipdr-logging-how-it-works</loc><lastmod>2024-05-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ipdr-logging-key-benefits</loc><lastmod>2024-05-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ipdr-logging-resources</loc><lastmod>2024-05-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ipdr-loglama-nedir-regulatif-ve-hukuki-perspektif</loc><lastmod>2024-12-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ipdr-loglamanin-temel-teknik-zorluklari</loc><lastmod>2025-01-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ironsphere-dunyanin-sayili-erisim-guvenligi-sirketleri-arasinda-gosterildi</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/is-ortagimiz-olun</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/is-ortaklari</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/is-ortaklarimiz</loc><lastmod>2026-02-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/is-your-5g-mobile-network-fully-secured</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/isletmelerinizi-guvence-altina-alin-kron-pam-ile-siber-guvenlik-sigortasi-maliyetlerini-dusurun</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/iste-en-cok-maruz-kalinan-10-siber-saldiri-turu</loc><lastmod>2021-03-01</lastmod></url><url><loc>https://krontech.com/iste-firsat-esitligi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/it-s-the-clouds-multicloud-computing-s-unintended-consequences</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/java-developer</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kaba-kuvvet-brute-force-saldirisi-nedir-nasil-onlenir</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/kadin-yonetim-kurulu-uyelerinin-oranini-artirmaya-yonelik-cesitlilik-politikamiz</loc><lastmod>2025-03-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kalite</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/kamu</loc><lastmod>2020-11-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kamu-kuruluslarinda-siber-guvenlik</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/kar-dagitim-politikasi</loc><lastmod>2022-02-16</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kerem-onursal</loc><lastmod>2024-08-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/key-computational-challenges-with-ipdr-logging</loc><lastmod>2025-01-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kimlik-bilgisi-doldurma-saldirisi-credential-stuffing-nedir</loc><lastmod>2022-10-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kimlik-erisim-yonetimi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kimlik-hirsizligindan-pam-ile-korunma-yollari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kimlik-ve-erisim-yonetimi-iam-nedir-neden-onemlidir</loc><lastmod>2022-11-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kisisel-veri-ve-kvkk-nedir</loc><lastmod>2020-11-21</lastmod></url><url><loc>https://krontech.com/komiteler</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-a-bir-odul-de-turk-elektronik-sanayicileri-dernegi-nden</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/en/kron-acknowledged-as-a-overall-leader-in-kuppingercole-analysts-leadership-compass-secure-remote-access-for-otics-report</loc><lastmod>2026-03-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-and-isnet-join-forces-for-cloud-access-security</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-and-naizak-announced-a-strategic-collaboration</loc><lastmod>2024-12-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-announces-big-data-processing-and-storage-project-with-ufone</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-asya-pazarina-teknoloji-ihrac-etmeye-devam-ediyor</loc><lastmod>2021-02-19</lastmod></url><url><loc>https://krontech.com/kron-bilisim-500-de-veri-guvenligi-alaninda-ust-uste-ucuncu-kez-birinci</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/kron-bilisim-500-odullerinde-veri-guvenligi-yazilimi-kategori-lideri-oldu</loc><lastmod>2021-09-17</lastmod></url><url><loc>https://krontech.com/kron-bilisim-sektoru-ar-ge-yatirimlarinda-ilk-10-sirket-arasinda</loc><lastmod>2021-07-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-bir-kez-daha-gartner-magic-quadrant-raporu-nda</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/kron-cyberpoint-ile-azerbaycan-pazari-icin-is-ortakligi-anlasmasi-imzaladi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-dam-ddm-gartnerin-veri-maskeleme-ve-sentetik-veri-icin-pazar-rehberinde-yer-aldi</loc><lastmod>2024-09-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-dam-ddm-kuppingercole-analysts-liderlik-pusulasi-veri-guvenligi-platformlari-challenger-olarak-yer-aldi</loc><lastmod>2026-03-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-dam-ddm-recognized-in-gartners-market-guide-for-data-masking-and-synthetic-data</loc><lastmod>2024-09-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-dam-ddm-recognized-in-kuppingercole-analysts-leadership-compass-for-data-security-platforms</loc><lastmod>2026-03-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-damddm-gartnerin-veri-maskeleme-ve-sentetik-veri-icin-pazar-rehberinde-yer-aldi</loc><lastmod>2024-09-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-damddm-recognized-in-gartners-market-guide-for-data-masking-and-synthetic-data</loc><lastmod>2024-09-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-dunyanin-lider-ayricalikli-erisim-yonetimi-sirketleri-arasinda-gosterildi</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/kron-dunyanin-lider-veri-guvenligi-sirketleri-arasinda-listelendi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-gartner-magic-quadrant-for-pam-raporunda-yer-alan-ilk-turk-sirketi-oldu</loc><lastmod>2021-02-18</lastmod></url><url><loc>https://krontech.com/kron-gartner-raporunda-guclu-performans-gosteren-kurumlardan-biri-oldu</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/en/kron-gpon-provisioning-and-service-activation</loc><lastmod>2023-10-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-have-become-one-of-the-companies-performing-strongly-in-the-gartner-report</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-introduced-ai-supported-cyber-security-products-at-black-hat-mea</loc><lastmod>2023-11-21</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-is-thrilled-to-have-had-the-pleasure-of-meeting-our-esteemed-guests-at-gitex-global</loc><lastmod>2023-10-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-it-sa-365te-yerini-aldi</loc><lastmod>2022-10-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-kuppingercole-analysts-liderlik-pusulasi-otics-icin-guvenli-uzaktan-erisim-raporunda-genel-lider-olarak-degerlendirildi</loc><lastmod>2026-03-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-kuppingercole-tarafindan-3-farkli-kategoride-lider-1-kategoride-ise-challenger-olarak-tanindi</loc><lastmod>2026-03-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-kuppingercole-tarafindan-dunyanin-lider-veri-guvenligi-ureticileri-arasinda-gosterildi</loc><lastmod>2025-03-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-named-export-champion</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-offices</loc><lastmod>2025-07-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-omdia-universe-raporunda-lider-olarak-yer-aldi</loc><lastmod>2021-11-01</lastmod></url><url><loc>https://krontech.com/en/kron-pam</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-forrester-in-2025-2-ceyrek-ayricalikli-kimlik-yonetimi-cozumleri-raporunda-yer-aldi</loc><lastmod>2025-04-07</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-how-it-works</loc><lastmod>2023-11-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-ile-gdpr-uyumlulugunun-saglanmasi</loc><lastmod>2024-08-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-ile-isletmenizi-yapay-zekanin-kotuye-kullanimina-karsi-koruyun</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-ile-saglik-sektorunde-guvenligi-artirma-hasta-verilerini-korumak-ve-uyumlulugu-saglamak</loc><lastmod>2024-10-21</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-ile-uygulamalar-arasi-parola-yonetimini-kolaylastir</loc><lastmod>2025-03-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-key-benefits</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-kuppingercole-analysts-liderlik-pusulasi-ayricalikli-erisim-yonetimi-pam-raporunda-urun-lideri-olarak-tanindi</loc><lastmod>2026-03-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-kuppingercole-analystsin-liderlik-pusulasi-insan-disi-kimlik-yonetimi-raporunda-genel-lider-ve-urun-lideri-olarak-tanindi</loc><lastmod>2026-03-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-kuppingercole-un-2024-ayricalikli-erisim-yonetimi-liderlik-rehberi-nde-urun-lideri-olarak-yer-aldi</loc><lastmod>2024-10-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-kuppingercole-un-leadership-compass-secure-remote-access-sra-for-otics-raporunda-genel-lider-olarak-yer-aldi</loc><lastmod>2025-11-07</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-product-family</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-recognized-as-a-product-leader-in-kuppingercole-s-2024-leadership-compass-for-pam</loc><lastmod>2024-10-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-recognized-as-overall-leader-product-leader-in-kuppingercole-analysts-leadership-compass-non-human-identity-management</loc><lastmod>2026-03-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-recognized-as-product-leader-in-kuppingercole-analysts-leadership-compass-privileged-access-management-pam</loc><lastmod>2026-03-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-recognized-in-forrester-s-privileged-identity-management-solutions-landscape-q2-2025</loc><lastmod>2025-04-07</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-resources</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-ve-microsoft-entra-id-entegrasyonu-ile-ayricalikli-erisim-yonetimini-gelistirmek</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-pam-videos</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-pam-web-oturum-yonetimi-ile-web-uygulama-guvenliginizi-guclendirin</loc><lastmod>2025-04-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-privileged-access-management-pam-for-achieving-uk-s-telecommunications-security-act-tsa-compliance-</loc><lastmod>2025-09-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-recognized-among-the-world-s-leading-data-security-providers-by-kuppingercole</loc><lastmod>2025-03-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-recognized-as-a-leader-in-omdia-universe</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-recognized-as-a-leader-in-omdia-universe-privileged-access-management-2021-report</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-recognized-as-category-leader-at-the-top-500-it-companies-in-turkey-awards</loc><lastmod>2025-08-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-recognized-in-the-gartner-magic-quadrant-report-twice-in-a-row</loc><lastmod>2022-09-01</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-showcased-its-cybersecurity-and-infrastructure-software-products-in-dubai</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-siber-guvenlik-ve-altyapi-yazilim-urunlerini-dubai-de-sergiledi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-siber-guvenlik-ve-telekom-cozumlerini-gitex-afrika-da-sergileyecek</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-technologies-delivers-record-2025-results-31-revenue-growth-51-ebitda-margin</loc><lastmod>2026-03-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-technologies-recognized-as-a-great-place-to-work-</loc><lastmod>2025-07-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-technologies-welcomes-devrim-akpinar-as-our-new-coo</loc><lastmod>2025-08-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-technologies-welcomes-mark-pinchook-as-director-of-sales-north-america</loc><lastmod>2026-03-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-technologies-welcomes-sibel-yilmaz-as-fractional-cmo</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknoloji-2025-te-beklentilerin-uzerinde-buyudu-gelirler-31-yinelenen-gelirler-43-artti</loc><lastmod>2026-03-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknoloji-bilisim-500-odullerinde-veri-guvenligi-yazilimi-ureticisi-kategori-birincisi-oldu</loc><lastmod>2025-08-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknoloji-de-stratejik-pazarlama-donemi-sibel-yilmaz-fractional-cmo-goreviyle-aramiza-katildi</loc><lastmod>2026-01-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknoloji-great-place-to-work-sertifikasi-ile-harika-bir-is-yeri-olarak-tescillendi</loc><lastmod>2025-07-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknoloji-ihracat-sampiyonu-oldu</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknoloji-ve-turkcell-den-siber-guvenlikte-yenilikci-cozum</loc><lastmod>2024-12-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknoloji-ve-turkcell-siber-guvenlikte-guclerini-birlestirdi</loc><lastmod>2025-03-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-teknolojiye-yeni-coo-devrim-akpinar-aramiza-katildi</loc><lastmod>2025-08-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kron-to-showcase-state-of-the-art-identity-access-management-data-security-and-telco-solutions-at-gitex-africa-2023</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-un-omdia-universe-deki-konumu-ve-rapor-incelemesi</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/kron-ve-bulutistan-arasinda-isbirligi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-ve-isnet-bulut-erisim-guvenligi-icin-guclerini-birlestiriyor</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-ve-naizak-arasinda-mea-bolgesi-distributorluk-anlasmasi-imzalandi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kron-ve-vodafone-business-is-ortakligindan-dunyada-bir-ilk</loc><lastmod>2021-07-08</lastmod></url><url><loc>https://krontech.com/en/kron-will-develop-telecom-infrastructure-management-software-for-turksat</loc><lastmod>2022-12-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/krondan-kullanicilara-veri-paylasimi-uyarisi</loc><lastmod>2021-02-19</lastmod></url><url><loc>https://krontech.com/en/krontech-named-a-leader-in-2021-omdia-universe-for-privileged-access-management</loc><lastmod>2022-12-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/krontech-partners-with-itl-global-services</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kronun-tum-dunyada-pazarladigi-siber-guvenlik-urunu-ikinci-kez-gartnerin-magic-quadrant-raporunda-yer-aldi</loc><lastmod>2021-09-17</lastmod></url><url><loc>https://krontech.com/kullanici-davranis-analizi-user-behavior-analytics-nedir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/kuppingercole-leadership-compass-pam-2020</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kuresel-risk-raporuna-gore-siber-saldirlar-artiyor</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/kuresel-riskler-raporu-ve-siber-guvenlige-bakis</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/kuruluslar-hassas-verilerini-neden-maskelemelidir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kurulusunuzdaki-ayricalikli-hesaplari-korumanin-bes-adimi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kurum-kulturu</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kurumlariniz-icin-kritik-olan-verinizi-guvenceye-alin-kron-dam-ddm-ile-hassas-veri-kesfi-ve-veri-korumasi</loc><lastmod>2025-04-16</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kurumsal-guvenligi-saglamak-kron-pamin-ayricalikli-erisimi-yonetme-ve-denetleme-stratejisi</loc><lastmod>2024-11-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kurumsal-yonetim</loc><lastmod>2020-11-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/kvkk-cezalari-ve-tedbirleri-nelerdir</loc><lastmod>2020-12-13</lastmod></url><url><loc>https://krontech.com/kvkk-kimleri-kapsiyor</loc><lastmod>2020-11-30</lastmod></url><url><loc>https://krontech.com/en/legacy-systems-modern-threats-and-the-identity-gap</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/log-data-sindaki-hizli-buyumenin-arkasindaki-baslica-nedenler</loc><lastmod>2024-11-01</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/log4j-guvenlik-acigi-nedir-nasil-korunabilirsiniz</loc><lastmod>2025-05-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/log4shellden-bir-yil-sonra-dahi-cogu-sirket-hala-saldirilara-maruz-kaliyor</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/logo-guidelines</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/logo-kullanim-kilavuzu</loc><lastmod>2021-01-04</lastmod></url><url><loc>https://krontech.com/lojistik-sektorunde-siber-guvenlik</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/en/lutfi-yenel</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/lutfi-yenel</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/making-the-azure-cloud-environment-more-secure-with-pam</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/mali-tablolar</loc><lastmod>2020-11-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/management</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/manoj-panchal</loc><lastmod>2024-09-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/manoj-panchal</loc><lastmod>2024-09-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/many-companies-are-still-exposed-to-attacks-even-one-year-after-the-detection-of-log4shell</loc><lastmod>2023-04-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/mark-pinchook</loc><lastmod>2026-02-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/mark-pinchook</loc><lastmod>2026-02-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/mark-your-calendars-for-channel-partners-conference-expo</loc><lastmod>2024-02-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/meet-our-team-at-gisec-global-2024</loc><lastmod>2024-03-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/meet-the-krontech-team-at-gisec-gulf-information-security-expo-conference-in-dubai-1-3-may-dubai-world-trade-centre</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/meet-the-krontech-team-at-the-idc-security-roadshow-in-almaty-on-may-17th-the-ritz-carlton-almaty-hotel</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/mehmet-a-tansal</loc><lastmod>2026-02-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/mehmet-a-tansal</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/mehmet-ilgaz</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/mehmet-ilgaz</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/menfaat-sahipleri-politikasi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/merkezi-parola-yonetimi-nedir-nasil-calisir</loc><lastmod>2022-08-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/metaverseu-arac-olarak-kullanan-siber-guvenlik-riskleri</loc><lastmod>2022-10-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/mete-sansal</loc><lastmod>2024-12-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/mevzuat-uyumlulugunu-ayricalikli-erisim-yonetimi-ile-kolaylastirin</loc><lastmod>2021-06-15</lastmod></url><url><loc>https://krontech.com/en/more-than-a-billion-people-were-affected-by-corporate-data-breaches-in-2018</loc><lastmod>2020-12-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/mssp-ler-acisindan-ayricalikli-erisim-yonetiminin-rolu</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/multi-factor-authentication</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/multi-factor-authentication-how-it-works</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/multi-factor-authentication-key-benefits</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/multi-factor-authentication-resources</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/multi-tenant-privileged-access-management-for-msps-and-mssps</loc><lastmod>2026-02-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/murat-demiralay</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/mutlaka-korumaniz-gereken-7-bt-yoneticisi-hesabi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-access-control-for-iot-pos-systems</loc><lastmod>2023-10-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-configuration-management</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-configuration-management-how-it-works</loc><lastmod>2022-10-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-configuration-management-key-benefits</loc><lastmod>2022-10-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-configuration-management-resources</loc><lastmod>2023-01-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-performance-metrics-5-essential-network-metrics-to-monitor</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-performance-monitoring</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-performance-monitoring-how-it-works</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-performance-monitoring-key-benefits</loc><lastmod>2022-11-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/network-performance-monitoring-resources</loc><lastmod>2022-11-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/new-cyber-security-regulations-are-on-the-way</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/new-target-of-ransomware-attacks-medium-sized-enterprises</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/newsroom</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/next-level-session-security-exploring-kron-pam-s-advanced-session-policies</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/observability-pipeline-101-concepts-and-terminology</loc><lastmod>2023-05-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/observability-pipeline-101-kavramlar-ve-terminoloji</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/oduller</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/en/offices</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ofisler</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/ofislerimiz</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/olga-matveeva</loc><lastmod>2025-09-24</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/olga-matveeva</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/olga-matveeva_</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/onur-semih-sevim</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/onur-semih-sevim</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/operasyon-ve-destek-siber-guvenlik</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/operasyon-ve-destek-telco</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/operation-support-engineer</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/oracle-rac-simplified-how-kron-damddm-secures-multi-node-databases</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ortaklik-yapisi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/osman-nezihi-alpturk</loc><lastmod>2024-08-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ot-security-with-kron-pam</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/our-partners</loc><lastmod>2026-02-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ozel-durum-aciklamalari</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/pam-as-a-service</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/pam-cozumleri-ile-veri-ihlallerinin-tespit-suresi-nasil-kisaltilir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/pam-kurulum-seceneklerini-kesfetme-ve-saas-ile-sirket-ici-cozumler-arasinda-secim-yapmak</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/pamdemic-in-the-pharma-industry-and-access-security-resilience</loc><lastmod>2023-06-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/parola-rotasyonu-nedir-nasil-uygulanir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/password-vault</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/password-vault-how-it-works</loc><lastmod>2023-09-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/password-vault-key-benefits</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/password-vault-product-family</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/password-vault-resources</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/paylasimli-hesaplar-ve-dikkat-edilmesi-gerekenler</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/pci-dss-4-0-hakkinda-bilinmesi-gerekenler</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/performance-manager-key-benefits</loc><lastmod>2020-12-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/performance-manager-product-family</loc><lastmod>2021-01-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/performance-manager-resources</loc><lastmod>2020-12-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/petabyte-scale-telco-data-retention</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/phishing-oltalama-nedir-korunma-yollari-nelerdir</loc><lastmod>2021-04-19</lastmod></url><url><loc>https://krontech.com/en/pillars-of-a-zero-trust-architecture-a-comprehensive-guide</loc><lastmod>2023-02-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/pinar-gungor-bilgin</loc><lastmod>2024-09-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/pinar-gungor-bilgin</loc><lastmod>2024-09-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/podcast</loc><lastmod>2024-12-09</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/podcast</loc><lastmod>2024-12-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/politikalar</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/premium-cloud-services-with-access-security-embedded</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/preparing-for-the-next-california-will-more-states-enact-consumer-privacy-laws</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/preventing-cloud-attack-vectors-with-privileged-access-management</loc><lastmod>2023-04-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/preventing-human-errors-in-data-breaches</loc><lastmod>2023-06-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/prioritizing-cybersecurity-in-the-age-of-digital-transformation</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privacy-policy</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privilege-escalation-explained-types-cases-and-prevention</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-access-management-for-telecom-and-cloud-service-providers</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-access-management-in-cloud-security</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-accounts-you-need-to-manage-and-keep-safe</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-session-manager</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-session-manager-how-it-works</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-session-manager-key-benefits</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-session-manager-product-family</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-session-manager-resources</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-task-automation</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-task-automation-how-it-works</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-task-automation-key-benefits</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-task-automation-myths-and-realities-rolling-a-boulder-up-a-hill</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-task-automation-product-family</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-task-automation-resources</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/privileged-task-automation-the-natural-extension-of-privileged-access-management</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/product-family</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/products</loc><lastmod>2022-12-01</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/protect-what-you-connect-kron-s-vision-our-collective-mission</loc><lastmod>2023-05-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/protecting-sensitive-data-common-pam-mistakes-to-avoid</loc><lastmod>2023-03-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/quality-assurance</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/quality-assurance-how-it-works</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/quality-assurance-key-benefits</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/quality-assurance-resources</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ransomware-attacks-are-increasing</loc><lastmod>2021-06-15</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/rashid-ahmed</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/recognized-as-a-leader-by-kuppingercole-4-categories-recognized-leading-trusted</loc><lastmod>2026-03-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/reduce-log-volume</loc><lastmod>2024-05-14</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/reducing-cyber-insurance-costs-with-kron-pam-a-smart-move-for-businesses</loc><lastmod>2024-04-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/reducing-firewall-log-volume-by-93-with-kron-telemetry-pipeline</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/reducing-risks-in-root-access-for-superusers</loc><lastmod>2021-04-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/replace-cisco-cpar-with-kron-aaa</loc><lastmod>2024-12-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/request-demo</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/resources</loc><lastmod>2022-08-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/rethinking-network-access-control-pam-for-network-infrastructure</loc><lastmod>2025-05-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/risks-of-shadow-it-and-prevention-methods</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/robust-data-security-in-the-digital-age-mastering-database-access-management-and-dynamic-data-masking</loc><lastmod>2024-04-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/rol-tabanli-erisim-kontrolu-rbac-nedir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sabit-kodlanmis-sirlara-vedalasin-kron-pam-ile-guvenli-kimlik-bilgisi-yonetimi</loc><lastmod>2024-08-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/safeguard-your-ai-future-how-kron-pam-secures-mcp-servers-with-zero-machine-identity-exposure</loc><lastmod>2025-04-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/safeguarding-your-business-from-misuse-of-ai-with-kron-pam</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/saglik-alaninda-siber-guvenlik</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/saglik-kuruluslarinin-kabusu-fidye-saldirilari-ve-odemeleri</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/saglik-sektorune-yonelik-siber-saldirilar-covid-19-kadar-bulasici-olacak-mi</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/saglik-sektorunu-tehdit-eden-siber-saldirilar</loc><lastmod>2021-03-21</lastmod></url><url><loc>https://krontech.com/saglik-sektorunu-tehdit-eden-siber-saldirilar-artiyor</loc><lastmod>2021-03-18</lastmod></url><url><loc>https://krontech.com/saldiriya-acik-alanlari-guclendirin-kron-un-database-firewall-u-tehditleri-gercek-zamanli-olarak-nasil-engelliyor</loc><lastmod>2025-05-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/say-goodbye-to-hardcoded-secrets-secure-credential-management-with-kron-pam</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/scalable-security-for-iot-deployments-privileged-and-permissioned</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/scalable-security-in-iot-networks</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/search</loc><lastmod>2020-11-24</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secrets-management-simplified-protecting-credentials-with-kron-pam</loc><lastmod>2025-03-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-ansible-automation-with-kron-pam-password-vault</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-cloud-wi-fi</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-cloud-wi-fi-how-it-works</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-cloud-wi-fi-key-benefits</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-cloud-wi-fi-resources</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-remote-access</loc><lastmod>2023-10-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-remote-access-rethinking-cybersecurity-in-a-remote-work-era</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-what-matters-how-kron-dam-ddm-elevate-sensitive-data-discovery-and-protection</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-your-privileged-access-insights-from-ibm-s-2024-cost-of-a-breach-report</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/secure-your-rpa-secrets-how-uipath-and-kron-pam-integration-solves-the-credential-challenge</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-application-credentials-with-kron-pam-a-shield-against-cyber-breaches</loc><lastmod>2024-12-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-critical-data-amid-cyber-warfare</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-data-access-best-practices-for-data-protection-tips-solutions</loc><lastmod>2023-04-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-industrial-operations-kron-pam-s-next-generation-solutions-for-ot-and-ics</loc><lastmod>2025-12-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-the-next-frontier-multi-attribute-security-with-kron-aaa</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-the-next-generation-of-private-networks-for-enterprises</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-third-party-access</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-virtualized-networks-a-pure-software-approach-using-advanced-privileged-access-management</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/securing-web-applications-with-kron-pam-s-privileged-session-manager</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/security-data-management</loc><lastmod>2025-04-24</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/security-or-efficiency-why-not-have-both</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/security-provisioning</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/seda-aktasli</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/sekerbank-chooses-kron-products-for-data-and-access-security</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sekerbank-veri-ve-erisim-guvenliginde-kron-urunlerini-tercih-ediyor</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/sektorler</loc><lastmod>2021-01-04</lastmod></url><url><loc>https://krontech.com/senior-c-developer</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/senior-java-developer</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/serdal-yildiz</loc><lastmod>2024-12-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/serdal-yildiz</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/serdal-yildiz_</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/serdal-yildiz__</loc><lastmod>2024-12-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/shareholder-structure</loc><lastmod>2024-05-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/sibel-yilmaz</loc><lastmod>2026-01-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sibel-yilmaz</loc><lastmod>2026-01-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/siber-fiziksel-sistemlerde-guvenligin-onemi</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/siber-guvenlik-calismalarinda-ayricalikli-erisim-yonetimi-yolculugu</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/siber-guvenlik-denetimine-en-iyi-sekilde-hazirlanmanin-ipuclari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/siber-guvenlik-urun-yonetimi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/siber-guvenlik-ve-altyapi-urunlerimizle-gitex-global-etkinliginde-yer-aldik</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/siber-guvenlikte-ic-tehditler-nedir-turleri-nelerdir</loc><lastmod>2021-06-29</lastmod></url><url><loc>https://krontech.com/siber-saldirganlar-teknolojiyi-degil-insanlari-kullanir-isletmelerde-veri-guvenligi-neden-insan-davranislarina-baglidir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/siber-saldirganlarin-hedefinde-finans-sektoru-var</loc><lastmod>2021-09-17</lastmod></url><url><loc>https://krontech.com/siber-saldirilar-avrupa-ve-abddeki-isletmelerin-beste-birini-iflasa-surukluyor</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/siber-saldirilar-son-donemde-enerji-ve-finans-sektorlerini-hedef-aliyor</loc><lastmod>2021-02-19</lastmod></url><url><loc>https://krontech.com/siber-saldirilara-karsi-bir-kalkan-kron-pam-ile-uygulama-kimlik-bilgilerinin-guvenligini-saglama</loc><lastmod>2024-12-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/siber-savasin-ortasinda-kritik-verilerin-guvenligini-saglamak</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/siber-tehditler-saglik-sektorunun-pesini-birakmiyor</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifir-guven-derinlemesine-savunmayi-oldurdu-mu-yoksa-derinlemesine-savunma-sifir-guveni-gelistirdi-mi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifir-guven-mimarisinin-yapi-taslari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifir-guven-yaklasimi-pam-ile-nasil-uygulanir</loc><lastmod>2021-03-14</lastmod></url><url><loc>https://krontech.com/sifre-kasasi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifre-kasasi-faydalari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifre-kasasi-kaynak-dokumanlar</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifre-kasasi-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifre-kasasi-nedir-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sifresiz-bir-gelecege-hic-olmadigi-kadar-yakiniz</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/sik-karsilasilan-bulut-guvenligi-zafiyetleri</loc><lastmod>2022-10-05</lastmod></url><url><loc>https://krontech.com/sikca-sorulan-sorular</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/sinan-keskin</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/sinan-keskin</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/single-connect-2100-release-is-now-available</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/single-connect-2120-release-is-now-available</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/single-connect-ile-veri-tabanlarinizdaki-erisimleri-guvenli-bir-sekilde-yonetebileceginizi-biliyor-musunuz</loc><lastmod>2021-01-04</lastmod></url><url><loc>https://krontech.com/sirketimizde-yeni-liderlik-donemi</loc><lastmod>2024-12-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sirketler-icin-a-dan-z-ye-siber-guvenlik</loc><lastmod>2021-04-25</lastmod></url><url><loc>https://krontech.com/sirketler-icin-kvkk-uyum-sureci</loc><lastmod>2020-12-06</lastmod></url><url><loc>https://krontech.com/sirketler-icin-veri-guvenligi-plani-nasil-olusturulur</loc><lastmod>2021-02-07</lastmod></url><url><loc>https://krontech.com/sirketler-ve-it-ekipleri-pandemi-sonrasi-dunyaya-nasil-hazirlaniyor</loc><lastmod>2020-11-11</lastmod></url><url><loc>https://krontech.com/sirketler-veri-sizintilarini-ne-zaman-acikliyor</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/smart-cities-and-cybersecurity</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/smart-cities-and-network-monitoring</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/solutions</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/solving-the-privileged-access-management-challenge-in-dynamic-cloud-environments</loc><lastmod>2024-07-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/sss</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/stock-market-announcements</loc><lastmod>2024-09-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/stopping-attacks-before-they-start-the-kron-pam-approach-to-remote-access-security</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/super-kullanicilar-icin-root-erisimindeki-risklerin-azaltilmasi</loc><lastmod>2021-04-25</lastmod></url><url><loc>https://krontech.com/en/supply-chain-risks-become-a-top-priority</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/sustaining-efficiency-while-securing-it-operations</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/tacacs-gets-the-axe-as-super-regional-everstream-opts-for-krontech-s-pam-solution</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/tacacs-radius-erisim-yonetimi-nedir-nasil-calisir</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/tacacs+-radius-erisim-yonetimi</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/tazminat-politikasi</loc><lastmod>2020-10-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/tedarik-zinciri-riskleri-birinci-oncelik-haline-geliyor</loc><lastmod>2022-10-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/tedarik-zinciri-saldirilarindan-nasil-korunulur</loc><lastmod>2021-02-28</lastmod></url><url><loc>https://krontech.com/tedarik-zinciri-saldirisi-nedir</loc><lastmod>2021-04-25</lastmod></url><url><loc>https://krontech.com/tehditlerden-guvene-kron-pam-in-guvenli-uzaktan-erisim-cozumu</loc><lastmod>2025-03-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/telecom</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/telekom</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/telekom-ve-bulut-servis-saglayicilari-icin-ayricalikli-erisim-yonetimi</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/telemetry-pipeline</loc><lastmod>2024-05-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/telemetry-pipeline_</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/telemetry-pipeline-how-it-works</loc><lastmod>2024-05-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/telemetry-pipeline-key-benefits</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/telemetry-pipeline-resources</loc><lastmod>2024-05-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/tesekkurler</loc><lastmod>2025-12-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/test-copya</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/thank-you_</loc><lastmod>2025-12-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-10-most-common-cyberattack-methods</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-anatomy-of-a-ransomware-attack</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-challenges-of-not-having-a-privileged-access-management-solution</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-first-major-breach-of-2019-and-what-this-australian-story-teaches-us</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-first-step-to-avoid-cyber-risks-in-cloud-security</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-importance-of-automating-privileged-tasks-for-data-security</loc><lastmod>2023-02-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-increasing-attack-surface-in-2019</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-invisible-threat-why-anomalies-in-user-behavior-are-a-major-risk-to-your-company</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-most-common-types-of-cyber-attacks-in-2021</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-nightmare-of-health-institutions-ransomware-attacks-and-payments</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/the-principle-of-least-privilege-polp-nedir</loc><lastmod>2021-03-28</lastmod></url><url><loc>https://krontech.com/en/the-privileged-access-management-journey-in-cybersecurity</loc><lastmod>2023-04-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-rising-cost-of-data-breaches-insights-and-solutions-with-kron-pam-and-damddm</loc><lastmod>2025-04-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-role-of-artificial-intelligence-in-cybersecurity-opportunities-and-challenges</loc><lastmod>2023-01-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-role-of-hacked-passwords-in-data-breaches</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-way-to-avoid-insider-risks-empathy</loc><lastmod>2022-12-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/the-ways-to-keep-sensitive-data-safe</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/there-is-no-true-cloud-security-without-comprehensive-command-and-control</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/things-to-consider-about-shared-accounts</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ticaret-sicil-bilgileri</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/ticari-bir-karar-olarak-siber-guvenlik</loc><lastmod>2022-10-05</lastmod></url><url><loc>https://krontech.com/en/todays-top-five-security-governance-methods</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/top-reasons-behind-the-rapid-growth-in-log-data</loc><lastmod>2024-10-31</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/traffic-analyzer-product-family</loc><lastmod>2020-12-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/traffic-analyzer-resources</loc><lastmod>2020-12-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/tubisad-ve-tbdnin-duzenledigi-yasam-boyu-hizmet-odulu-toreni-ankara-da-gerceklesti</loc><lastmod>2024-12-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/turkcell-kron-cooperation-continues-strongly</loc><lastmod>2022-09-01</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/turkcell-ve-kron-is-birligi-guclenerek-devam-ediyor</loc><lastmod>2021-02-18</lastmod></url><url><loc>https://krontech.com/turkiye-nin-siber-guvenlik-vizyonu-ve-kron-pam-in-rolu-2024-2028-stratejisi-kritik-bir-adim</loc><lastmod>2024-09-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/turning-firewall-logs-into-ipdr-with-kron-telemetry-pipeline</loc><lastmod>2025-11-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/types-of-sensitive-data-ways-to-protect-them</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/uc-nokta-ayricalik-yonetimi-epm-nedir-ve-isletmeler-neden-buna-ihtiyac-duyar</loc><lastmod>2025-02-13</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/uc-nokta-ayricalik-yonetimi-nedir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/uc-nokta-guvenligi-nedir-nasil-saglanir</loc><lastmod>2022-10-21</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ucret-politikasi</loc><lastmod>2020-10-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ucuncu-parti-erisiminin-guvenligini-saglamak</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/uk-s-ncsc-advises-pam-for-telecom-networks</loc><lastmod>2022-12-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/uk-s-telecommunications-security-act-tsa-code-of-practice</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/umit-s-celik</loc><lastmod>2026-02-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/umit-s-celik</loc><lastmod>2026-02-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/understanding-network-resilience-and-how-to-provide-it</loc><lastmod>2023-04-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/understanding-pci-dss-4-0-and-achieving-compliance</loc><lastmod>2023-04-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/understanding-role-based-access-control-rbac-benefits-examples-and-implementation</loc><lastmod>2023-06-06</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/understanding-the-lifecycle-of-a-data-breach</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unicorn-academy</loc><lastmod>2025-07-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/unicorn-academy</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unified-access-manager</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unified-access-manager-how-it-works</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unified-access-manager-key-benefits</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unified-access-manager-product-family</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unified-access-manager-resources</loc><lastmod>2026-03-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unifying-kubernetes-telemetry-in-a-diverse-and-fragmented-collector-world</loc><lastmod>2026-01-12</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unlocking-efficiency-the-strategic-advantages-of-saas-pam-in-business</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/unveiling-the-crucial-role-of-privileged-access-security-and-governance-in-nis2-compliance</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/urun-ve-cozum-yonetimi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/urunler</loc><lastmod>2021-01-02</lastmod></url><url><loc>https://krontech.com/en/user-behavior-analytics</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/user-behavior-analytics-how-it-works</loc><lastmod>2022-10-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/user-behavior-analytics-key-benefits</loc><lastmod>2022-10-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/user-behavior-resources</loc><lastmod>2023-06-08</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/ust-duzey-oturum-guvenligi-kron-pam-in-gelismis-oturum-politikalarini-kesfedin</loc><lastmod>2025-06-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/uzaktan-calisanlar-icin-ayricalikli-erisim-yonetimi</loc><lastmod>2021-02-27</lastmod></url><url><loc>https://krontech.com/uzaktan-erisim-sirasinda-olusan-riskler-ve-alinabilecek-onlemler</loc><lastmod>2020-11-19</lastmod></url><url><loc>https://krontech.com/veri-guvenligi-neden-onemlidir</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/veri-guvenligi-ve-veri-gizliligi-arasindaki-5-fark</loc><lastmod>2021-01-31</lastmod></url><url><loc>https://krontech.com/veri-guvenliginde-ayricalikli-gorev-otomasyonunun-onemi</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veri-ihlali-tespitinde-uygulanmasi-gereken-7-temel-adim</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/veri-ihlali-yasam-dongusu-hakkinda-bilmeniz-gerekenler</loc><lastmod>2022-10-13</lastmod></url><url><loc>https://krontech.com/veri-ihlalleri-chatgpt-icin-guvenlik-risklerini-ortaya-cikariyor</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veri-ihlallerinde-ele-gecirilen-parolalarin-rolu</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/veri-ihlallerinde-insan-kaynakli-hatalari-onlemenin-yollari</loc><lastmod>2021-06-15</lastmod></url><url><loc>https://krontech.com/veri-ihlallerini-kontrol-altina-almak-ortalama-287-gun-suruyor</loc><lastmod>2022-08-19</lastmod></url><url><loc>https://krontech.com/veri-ihlallerinin-artan-maliyeti-kron-pam-ve-damddm-ile-cozumler</loc><lastmod>2025-04-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veri-maskeleme-neden-bu-kadar-onemli</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veri-maskeleme-nedir-turleri-nelerdir</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/veri-ve-erisim-guvenligi-verilerin-korunmasina-yonelik-en-iyi-uygulamalar-ipuclari-cozumler-</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/verimliligin-kilidini-acmak-isletmelerde-saas-pamin-stratejik-avantajlari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veritabani-erisim-yoneticisi-ve-dinamik-veri-maskeleme</loc><lastmod>2022-04-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veritabani-erisim-yoneticisi-ve-dinamik-veri-maskeleme-faydalari</loc><lastmod>2022-04-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veritabani-erisim-yoneticisi-ve-dinamik-veri-maskeleme-kaynak-dokumanlar</loc><lastmod>2022-04-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veritabani-erisim-yoneticisi-ve-dinamik-veri-maskeleme-nasil-calisir</loc><lastmod>2022-04-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veritabani-erisim-yoneticisi-ve-dinamik-veri-maskeleme-nedir-nasil-calisir</loc><lastmod>2022-08-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/veritabani-erisim-yoneticisi-ve-dinamik-veri-maskeleme-urun-ailesi</loc><lastmod>2022-04-25</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/verizon-2022-dbir-raporunda-one-cikan-sonuclar</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/en/verizon-2023-dbir-latest-insights-on-cyber-threats</loc><lastmod>2023-06-27</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/verizon-2023-dbir-siber-tehditlere-iliskin-guncel-icgoruler</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/verizon-dbir-2021-fidye-yazilimlari-phishing-insan-kaynakli-hatalar-ve-dahasi</loc><lastmod>2021-06-15</lastmod></url><url><loc>https://krontech.com/en/verizon-dbir-2021-ransomware-phishing-human-errors-and-more</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/ways-to-mitigate-insider-threats-using-privileged-access-management</loc><lastmod>2023-06-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/we-met-with-our-business-partners-and-customers-at-black-hat-mea-where-we-participated-as-a-bronze-sponsor</loc><lastmod>2023-11-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/we-participated-in-the-gitex-global-with-our-cybersecurity-and-infrastructure-products</loc><lastmod>2024-12-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/welcoming-our-new-leadership</loc><lastmod>2024-12-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-a-brute-force-attack-how-to-prevent-them</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-a-database-access-manager-and-dynamic-data-masking</loc><lastmod>2023-04-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-a-supply-chain-attack</loc><lastmod>2026-01-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-aaa-authentication-authorization-accounting</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-credential-stuffing</loc><lastmod>2022-11-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-data-masking-types-techniques-explained</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-data-stream-processing-why-is-it-important</loc><lastmod>2023-04-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-endpoint-privilege-management</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-endpoint-privilege-management-epm-and-why-do-enterprises-need-it</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-endpoint-security-how-to-ensure-it</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-identity-and-access-management-iam-why-is-it-important</loc><lastmod>2022-11-07</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-information-security-infosec</loc><lastmod>2022-12-28</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-ipdr-logging-a-regulatory-and-compliance-perspective</loc><lastmod>2024-12-02</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-log4j-vulnerability-how-to-protect-from-it</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-multi-factor-authentication-how-does-it-work</loc><lastmod>2023-04-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-network-monitoring-why-is-it-important</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-network-performance-monitoring-how-does-it-work</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-password-rotation-how-should-you-apply-it</loc><lastmod>2023-07-04</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-password-vault-how-does-it-work</loc><lastmod>2026-02-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-phishing-how-to-prevent-from-it</loc><lastmod>2021-04-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-privileged-access-management-pam</loc><lastmod>2026-01-16</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-privileged-session-manager-how-does-it-work</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-privileged-task-automation-how-does-it-work</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-tacacs-radius-access-management-how-does-it-work</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-the-principle-of-least-privilege-polp</loc><lastmod>2026-02-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-user-behavior-analytics</loc><lastmod>2023-04-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-is-zero-trust</loc><lastmod>2026-01-30</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/what-makes-data-masking-so-important</loc><lastmod>2023-03-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/when-do-companies-disclose-data-breaches</loc><lastmod>2023-04-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/whitepaper-kimlik-yonetimi-ve-idaresinde-uzmanlasma</loc><lastmod>2021-03-18</lastmod></url><url><loc>https://krontech.com/en/why-are-internal-threats-increasing-five-questions-to-ask-</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/why-is-access-control-important</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/why-is-data-security-important</loc><lastmod>2022-08-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/why-should-organizations-mask-their-sensitive-data</loc><lastmod>2023-01-31</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/why-should-you-prioritize-privileged-account-security</loc><lastmod>2022-01-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/why-ssh-security-matters-and-how-kron-pam-s-privileged-session-manager-protects-your-enterprise</loc><lastmod>2025-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/will-legacy-infrastructure-strike-back</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/with-telecom-apis-on-the-rise-access-security-becomes-an-imperative</loc><lastmod>2020-10-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yapay-zeka-destekli-ayricalikli-erisim-yonetimi-ile-siber-guvenligi-gelistirme</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yapay-zeka-geleceg-inizi-gu-vence-altina-alin-kron-pam-ile-mcp-sunucularinda-makine-kimlig-i-gu-venlig-i</loc><lastmod>2025-04-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yapay-zekanin-siber-guvenlikteki-rolu-firsatlar-ve-zorluklar</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yatirimci-iliskileri</loc><lastmod>2020-11-19</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yatirimci-sunumlari</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/yavuz-suat-bengur</loc><lastmod>2026-02-18</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yavuz-suat-bengur</loc><lastmod>2024-12-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yavuz-suat-bengur_</loc><lastmod>2024-12-22</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yazilim-gelistirme</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yazilim-gelistirme-ii</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yazilim-gelistirme-iii</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yeni-siber-guvenlik-duzenlemeleri-yolda</loc><lastmod>2022-10-05</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yetki-yukseltmesi-privilege-escalation-hakkinda-bilmeniz-gerekenler</loc><lastmod>2022-08-17</lastmod></url><url><loc>https://krontech.com/yetkili-oturum-yoneticisi-nedir-nasil-calisir</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yonetim</loc><lastmod>2020-11-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yonetim-kurullarinin-dikkate-almasi-gereken-5-siber-guvenlik-sorusu</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yonetim-kurulu</loc><lastmod>2020-11-11</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yonetim-kurulu-toplanti-usul-ve-esaslari</loc><lastmod>2025-03-10</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yonetmeniz-ve-guvende-tutmaniz-gereken-ayricalikli-hesaplar</loc><lastmod>2024-06-26</lastmod></url><url><loc>https://krontech.com/en/your-biggest-security-risk-isn-t-human-fixing-non-human-identities-with-kron-pam</loc><lastmod>2026-03-23</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/yuksek-erisilebilirlik-dusuk-karmasa-kron-pam-ile-sade-guvenli-ve-olceklenebilir-bir-yaklasim</loc><lastmod>2025-05-29</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/zero-trust-and-least-privilege</loc><lastmod>2023-10-17</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/zero-trust-sifir-guven-modeli-nedir</loc><lastmod>2021-03-07</lastmod></url><url><loc>https://krontech.com/en/zeynep-tokman-cesur</loc><lastmod>2023-11-03</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/zeynep-tokman-cesur</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/zeynep-yenel-onursal</loc><lastmod>2024-06-26</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/zeynep-yenel-onursal_</loc><lastmod>2024-12-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url><url><loc>https://krontech.com/en/zeynep-yenel-onursal_</loc><lastmod>2024-12-20</lastmod><changefreq>weekly</changefreq><priority>0.8</priority></url></urlset>