<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.theom.ai</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/company</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/integrations</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/blog</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/request-a-demo</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/confirm-request</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/pricing</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/careers</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/contact-us</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/resources</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/14-common-misconceptions-about-web-design</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/7-must-have-tools-for-web-designers</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/ai-data-becomes-mission-critical-theom-raises-20-million-series-a-to-launch-the-first-data-operations-center</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/ai-needs-data-and-data-needs-governance</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/charting-the-future-of-autonomous-data-security</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/cloud-data-protection-going-beyond-config-based-measures</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/coming-soon</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/continuous-monitoring-for-compliance-and-regulations</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-access-governance-principles-of-least-privilege</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-centric-cloud-security-protect-what-matters-most-on-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-discovery-and-protection</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-protection-a-dominant-theme-across-gartners-top-security-and-risk-trends-2022</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-blindspots-for-snowflake-databricks</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-bytes-01-what-is-zerotrust-data-security-does-data-have-an-identity</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-bytes-02-data-proliferation-and-what-that-means-to-security</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-bytes-03-is-your-cloud-security-data-centric</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-bytes-04-business-innovation-needs-third-party-data-how-can-security-enable-vendor-data-usage</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-bytes-05-why-context-of-data-and-identity-are-important-to-reduce-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-bytes-06-continuous-proactive-protection-against-new-emerging-breach-techniques</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-growing-healthcare-businesses-with-hitrust</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/data-security-posture-management-dspm-solution</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/digital-transformation</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/digital-transformation-2</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/dspm-vs-cspm-or-dlp-unravel-the-differences</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/eight-ways-data-can-leave-your-cloud-data-warehouse</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/gds-security-summit-panel-how-to-identify-and-prevent-threats-to-cloud-data</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/implementing-a-data-bodyguard-for-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/new-sec-cybersecurity-rules-define-need-for-early-detection-of-data-breaches</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/parsing-the-whitehouse-factsheet-data-security</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/platform-architecture-what-differentiates-theoms-cloud-data-protection-platform</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/provable-security-theom-integrates-with-hedera</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/seed-funding-and-our-vision-to-solve-data-security-for-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/snowflake-what-use-cases-are-driving-adoption</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/the-history-of-web-design</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/theom-and-snowflake-horizon-govern-and-secure-your-data-in-the-data-cloud</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/theom-delivers-on-nist-csf-outcomes-for-enterprises</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/theom-is-the-only-vendor-to-be-named-both-a-leader-and-an-outperformer-in-the-gigaom-radar-for-dspm</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/theom-named-a-leader-in-the-2026-forrester-wave-tm-for-sensitive-data-discovery-and-classification</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/transient-shares-on-cloned-data-in-data-warehouses</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/uncovering-risks-in-your-dark-data</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/verizon-2022-data-breach-investigations-report-dbir-growth-in-front-door-data-exfiltration-attacks</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/what-are-your-top-data-assets-with-risks</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/why-i-joined-theom</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/you-cant-protect-what-you-cant-see-holistic-visibility</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/zerotrustdata</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/post/zerotrustdatasecurity</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/resources/data-becomes-mission-critical-theom-raises-20-million-series-a-to-launch-the-first-data-operations-center-copy</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/reports/download-forrester-report</loc>
    </url>
    <url>
        <loc>https://www.theom.ai/reports/download-gigaom-report</loc>
    </url>
</urlset>