<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 28, 2026 at 3:11 am by All in One SEO v4.9.0 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.v-key.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>V-Key</title>
		<link><![CDATA[https://www.v-key.com]]></link>
		<description><![CDATA[V-Key]]></description>
		<lastBuildDate><![CDATA[Wed, 07 Jan 2026 03:25:15 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.v-key.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.v-key.com/]]></guid>
			<link><![CDATA[https://www.v-key.com/]]></link>
			<title>V-Key | Redefining Digital Identity</title>
			<pubDate><![CDATA[Wed, 07 Jan 2026 03:25:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/products/v-os-mobile-smart-token/]]></guid>
			<link><![CDATA[https://www.v-key.com/products/v-os-mobile-smart-token/]]></link>
			<title>V-OS Smart Token</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:39:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/products/v-os-virtual-secure-element/]]></guid>
			<link><![CDATA[https://www.v-key.com/products/v-os-virtual-secure-element/]]></link>
			<title>V-OS Virtual Secure Element</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:38:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/products/v-key-id/]]></guid>
			<link><![CDATA[https://www.v-key.com/products/v-key-id/]]></link>
			<title>V-Key ID</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:37:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/products/v-os-mobile-app-protection/]]></guid>
			<link><![CDATA[https://www.v-key.com/products/v-os-mobile-app-protection/]]></link>
			<title>V-OS Mobile App Protection</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:36:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/products/v-os-biometric-identities/]]></guid>
			<link><![CDATA[https://www.v-key.com/products/v-os-biometric-identities/]]></link>
			<title>V-OS Biometric Identities</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:36:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/products/v-key-smart-authenticator/]]></guid>
			<link><![CDATA[https://www.v-key.com/products/v-key-smart-authenticator/]]></link>
			<title>V-Key Smart Authenticator</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:34:24 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/products/v-os-app-identity/]]></guid>
			<link><![CDATA[https://www.v-key.com/products/v-os-app-identity/]]></link>
			<title>V-OS App Identity</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:32:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/contact-v-key/]]></guid>
			<link><![CDATA[https://www.v-key.com/contact-v-key/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:09:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/executive-ck/]]></guid>
			<link><![CDATA[https://www.v-key.com/executive-ck/]]></link>
			<title>Executive &#8211; CK</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:06:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/executive-raymond/]]></guid>
			<link><![CDATA[https://www.v-key.com/executive-raymond/]]></link>
			<title>Executive &#8211; Raymond</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:05:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/app-protection-guide/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/app-protection-guide/]]></link>
			<title>App Protection Guide</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:05:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/application-hooking/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/application-hooking/]]></link>
			<title>Application Hooking</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:05:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/sim-swap-fraud/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/sim-swap-fraud/]]></link>
			<title>Sim Swap Fraud</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:04:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-rasp-whitepaper/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-rasp-whitepaper/]]></link>
			<title>V-Key RASP whitepaper</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:04:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/terms-of-use/]]></guid>
			<link><![CDATA[https://www.v-key.com/terms-of-use/]]></link>
			<title>Terms of Use</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:03:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/privacy-policy/]]></guid>
			<link><![CDATA[https://www.v-key.com/privacy-policy/]]></link>
			<title>Privacy Policy</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:03:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/v-key-identity/]]></guid>
			<link><![CDATA[https://www.v-key.com/v-key-identity/]]></link>
			<title>V-Key Identity</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:01:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/v-key-shield/]]></guid>
			<link><![CDATA[https://www.v-key.com/v-key-shield/]]></link>
			<title>V-Key Shield</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:00:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/about/]]></guid>
			<link><![CDATA[https://www.v-key.com/about/]]></link>
			<title>About V-Key</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 06:00:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/v-key-compliance/]]></guid>
			<link><![CDATA[https://www.v-key.com/v-key-compliance/]]></link>
			<title>V-Key Compliance</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 05:59:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/technology-ekyc/]]></guid>
			<link><![CDATA[https://www.v-key.com/technology-ekyc/]]></link>
			<title>Technology: eKYC</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 05:57:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/mfa/]]></guid>
			<link><![CDATA[https://www.v-key.com/mfa/]]></link>
			<title>Technology: MFA</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 05:54:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-launches-digital-trust-platform-to-enable-secure-cloud-based-digital-solutions-and-services-across-industries/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-launches-digital-trust-platform-to-enable-secure-cloud-based-digital-solutions-and-services-across-industries/]]></link>
			<title>V-Key Launches Digital Trust Platform to Enable Secure Cloud-Based Digital Solutions and Services Across Industries</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 05:46:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/app-protection-vs-app-shield/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/app-protection-vs-app-shield/]]></link>
			<title>V-OS App Shield vs. V-OS Mobile App Protection: Choosing the Right Solution for Your Mobile App</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 05:45:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-keys-2024-journey-in-advancing-digital-security-and-empowering-seamless-digital-experiences/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-keys-2024-journey-in-advancing-digital-security-and-empowering-seamless-digital-experiences/]]></link>
			<title>V-Key&#8217;s 2024 Journey in Advancing Digital Security and Empowering Seamless Digital Experiences</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 05:44:32 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-listed-as-sample-vendor-in-2021-gartner-hype-cycle-for-identity-and-access-management/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-listed-as-sample-vendor-in-2021-gartner-hype-cycle-for-identity-and-access-management/]]></link>
			<title>V-Key Listed as Sample Vendor in 2021 Gartner Hype Cycle for Identity and Access Management</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:10:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/how-does-a-virtual-smart-card-protect-a-customer-if-they-lose-or-change-their-mobile-phone/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/how-does-a-virtual-smart-card-protect-a-customer-if-they-lose-or-change-their-mobile-phone/]]></link>
			<title>How does a Virtual Smart card protect a customer if they lose or change their mobile phone?</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:09:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/is-software-based-biometrics-authentication-the-solution-to-aseans-regulatory-challenges/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/is-software-based-biometrics-authentication-the-solution-to-aseans-regulatory-challenges/]]></link>
			<title>Is software-based Biometrics Authentication the solution to ASEAN’s regulatory challenges?</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:08:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/biometric-mobile-security-vietnam/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/biometric-mobile-security-vietnam/]]></link>
			<title>Vietnam’s New Digital Security Regulations: Strengthening Mobile and Biometric Protections</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:08:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-continues-to-expand-in-australia-to-strengthen-digital-identity-and-authentication/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-continues-to-expand-in-australia-to-strengthen-digital-identity-and-authentication/]]></link>
			<title>V-Key Continues to Expand in Australia to Strengthen Digital Identity and Authentication</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:07:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/modern-authentication-in-anz-finding-the-balance-between-security-and-user-experience/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/modern-authentication-in-anz-finding-the-balance-between-security-and-user-experience/]]></link>
			<title>Modern Authentication in ANZ: Finding the Balance Between Security and User Experience</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:06:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/most-mobile-authentication-apps-can-be-breached-even-if-hardware-security-is-used/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/most-mobile-authentication-apps-can-be-breached-even-if-hardware-security-is-used/]]></link>
			<title>Most Mobile Authentication Apps Can be Breached, Even if Hardware Security is Used</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:06:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-id-trusted-digital-identity-solution-for-secure-access-across-all-platforms/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-id-trusted-digital-identity-solution-for-secure-access-across-all-platforms/]]></link>
			<title>V-Key ID: Trusted Digital Identity Solution for Secure Access Across All Platforms</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:06:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-at-coba-2025-strengthening-digital-identity-and-compliance-in-australia/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-at-coba-2025-strengthening-digital-identity-and-compliance-in-australia/]]></link>
			<title>V-Key at COBA 2025: Strengthening Digital Identity and Compliance in Australia</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:05:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-support-huaweis-harmonyos-next/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-support-huaweis-harmonyos-next/]]></link>
			<title>V-Key Expands Support to Huawei&#8217;s HarmonyOS NEXT for Enhanced Mobile Security</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:04:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/mobile-malware-landscape-in-2024/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/mobile-malware-landscape-in-2024/]]></link>
			<title>Mobile Malware Landscape in 2024: Why App Security Is Critical for Businesses</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:04:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/sms-otp-phase-out/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/sms-otp-phase-out/]]></link>
			<title>Redefining Authentication with the Shift from SMS OTPs to Advanced Solutions</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:03:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/app-shield-launch/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/app-shield-launch/]]></link>
			<title>Introducing V-OS App Shield: Connect, Deploy and Protect your App in Minutes</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 04:01:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/5-simple-and-effective-ways-to-secure-your-mobile-app-with-v-os-app-shield/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/5-simple-and-effective-ways-to-secure-your-mobile-app-with-v-os-app-shield/]]></link>
			<title>5 Simple and Effective Ways to Secure Your Mobile App with V-OS App Shield</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:59:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-japan-mobile-app-digital-identity-protection/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-japan-mobile-app-digital-identity-protection/]]></link>
			<title>V-Key Expands to Japan, Enhancing Mobile App and Digital Identity Security</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:59:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-extends-idaas-offerings-in-apac-with-ingram-micro-cloud-agreement/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-extends-idaas-offerings-in-apac-with-ingram-micro-cloud-agreement/]]></link>
			<title>V-Key extends IDaaS offerings in APAC with Ingram Micro Cloud Agreement</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:57:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/how-do-we-determine-the-effectiveness-of-mobile-apps-security-systems/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/how-do-we-determine-the-effectiveness-of-mobile-apps-security-systems/]]></link>
			<title>How do we determine the effectiveness of mobile apps’ security systems?</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:56:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/is-detection-of-jailbroken-rooted-phone-sufficient-against-threats/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/is-detection-of-jailbroken-rooted-phone-sufficient-against-threats/]]></link>
			<title>Is the detection of jailbroken/rooted phone sufficient against threats?</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:56:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-partners-with-bridge-alliance-to-build-a-safer-digital-ecosystem/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-partners-with-bridge-alliance-to-build-a-safer-digital-ecosystem/]]></link>
			<title>V-Key partners with Bridge Alliance to build a Safer Digital Ecosystem</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:56:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/navigating-business-technology-and-trust-v-key-at-aibp-malaysia-2025/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/navigating-business-technology-and-trust-v-key-at-aibp-malaysia-2025/]]></link>
			<title>Navigating Business, Technology and Trust: V-Key at AIBP Malaysia 2025</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:55:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/protect-against-mobile-app-security-breaches/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/protect-against-mobile-app-security-breaches/]]></link>
			<title>The Real Cost of Mobile App Breaches and How to Stay Ahead of Threats</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:55:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/building-digital-trust-vietnam-banking-security/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/building-digital-trust-vietnam-banking-security/]]></link>
			<title>Building Digital Trust with V-Key at the State Bank of Vietnam Event </title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:54:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/v-key-secures-strategic-majority-investment-from-tower-capital-asia/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/v-key-secures-strategic-majority-investment-from-tower-capital-asia/]]></link>
			<title>V-Key Secures Strategic Majority Investment from Tower Capital Asia</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:53:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.v-key.com/resource/mobile-app-security-without-sacrificing-speed/]]></guid>
			<link><![CDATA[https://www.v-key.com/resource/mobile-app-security-without-sacrificing-speed/]]></link>
			<title>Why Developers Shouldn’t Have to Choose Between Speed and Security</title>
			<pubDate><![CDATA[Mon, 27 Apr 2026 03:53:09 +0000]]></pubDate>
		</item>
				</channel>
</rss>
