{"id":197,"date":"2021-07-02T10:01:40","date_gmt":"2021-07-02T10:01:40","guid":{"rendered":"http:\/\/localhost\/iaas\/?page_id=197"},"modified":"2021-09-17T05:29:46","modified_gmt":"2021-09-17T09:29:46","slug":"who-we-are","status":"publish","type":"page","link":"https:\/\/elivebiz.com\/IAAS\/who-we-are\/","title":{"rendered":"Who We Are"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"197\" class=\"elementor elementor-197\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0fc947b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0fc947b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b27af2c\" data-id=\"b27af2c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c34d15 elementor-widget elementor-widget-text-editor\" data-id=\"3c34d15\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"title-head\"><h6>About Us<\/h6><h2>Identity and<br \/>Access Solutions (IAAS)<\/h2><p>From the beginning, the IAAS mission has been to help fill the void in the timely sourcing of experienced Identity Access Management (IAM) architects and deployment services subject matter experts (SMEs) for our clients, which include many of the major players in the global IAM services industry.<\/p><p>Founded in 2015, the IAAS founders knew Identity was a primary threat vector for cyber security attacks. They recognized the <strong>growing talent gap<\/strong> making it increasingly difficult for the IAM community to find enough certified and highly qualified IAM architects and deployment engineers to administer successful Access Control, Privileged Access Management (PAM), Identity Governance and Administration (IGA), and Cybersecurity projects.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2ec4692\" data-id=\"2ec4692\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb9d840 rght-wwa elementor-widget elementor-widget-image\" data-id=\"eb9d840\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/07\/about-us.jpg\" class=\"attachment-large size-large wp-image-208\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8cbf30d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8cbf30d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-622e25d\" data-id=\"622e25d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f54ac23 elementor-widget elementor-widget-text-editor\" data-id=\"f54ac23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our hundreds of successful placements and engagements include IAM projects with global multi-national firms focused on Financial Services, Pharmaceutical, Government, Oil &amp; Gas, and Consumer Products and Services industries throughout North America, Europe, the Middle East, and Asia Pacific. We have grown &#8212; and will continue to expand &#8212; our global reach into more geographic markets as client needs demand.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4091287 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4091287\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e49d7e0\" data-id=\"e49d7e0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9062914 elementor-widget elementor-widget-text-editor\" data-id=\"9062914\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Common benefits of our services for our clients include the following:<\/strong><\/p><ul><li>IAAS delivers experienced vendor-certified IAM analysts, developers, and architects who possess practical, hands-on experience in the design and deployment of <strong>today\u2019s leading enterprise IAM technologies<\/strong>, including Ping, Thycotic-Centrify, BeyondTrust, Sailpoint, Savyint, Okta, CyberArk, and Oracle.<\/li><li>We provide a \u201cZero Cost Bench\u201d for firms which require rapid staff augmentation for successful, profitable, and on-time project delivery.<\/li><li>Ability to ramp up resources quickly in offshore (India) and nearshore (Canada) capacity<\/li><\/ul><p>To discuss your IAM staffing needs, please <a href=\"https:\/\/www.identityandaccesssolutions.com\/contact-us\"><em>contact us<\/em><\/a> today to see why our customers rely on our proven capabilities and have complete confidence that they are in very capable hands when working with IAAS.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>About Us Identity andAccess Solutions (IAAS) From the beginning, the IAAS mission has been to help fill the void in the timely sourcing of experienced Identity Access Management (IAM) architects and deployment services subject matter experts (SMEs) for our clients, which include many of the major players in the global IAM services industry. Founded in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":198,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"whoarewe.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-197","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":52,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages\/197\/revisions"}],"predecessor-version":[{"id":1200,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages\/197\/revisions\/1200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/media\/198"}],"wp:attachment":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/media?parent=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}