Supply Chain Risk Management

[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” module_class=”top-banner” _builder_version=”4.9.3″ _module_preset=”default” background_color=”#f7f7f7″ use_background_color_gradient=”on” background_color_gradient_start=”rgba(0,0,0,0.4)” background_color_gradient_end=”rgba(0,0,0,0.29)” background_color_gradient_overlays_image=”on” background_image=”https://www.zagtech.com/wp-content/uploads/2020/10/logistics-dock-trucking.jpg” custom_padding=”90px||70px||false|” custom_padding_tablet=”50px||25px||false|false” custom_padding_phone=””][et_pb_row _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”0px||0px|||”][et_pb_column type=”4_4″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” header_text_color=”#ffffff” header_font_size=”50px” header_4_line_height=”1.3em” width=”78%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||8px||false|false” header_font_size_tablet=”35px”]

Supply Chain IT Risk Management

[/et_pb_text][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” header_4_font=”Proxima Nova – Regular||||||||” header_4_text_color=”#ffffff” header_4_font_size=”22px” width=”80%” custom_margin=”||15px||false|false”]

Identify Supply Chain Threats Before They Start

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/bavkground-gray.jpg” custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||0px||false|false” custom_padding_phone=”||0px||false|false” background_last_edited=”on|desktop” background_enable_image_tablet=”off”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”off|desktop” _builder_version=”4.9.3″ _module_preset=”default” background_enable_image=”off” custom_padding=”1px||1px||true|false” custom_padding_tablet=”||20px||false|false” custom_padding_phone=”50px||20px||false|false”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”30px||30px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” text_font_size=”20px” quote_font_size=”18px” header_2_font_size=”36px” width=”98%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone”]

With cyberthreats on the rise, now is the time to look beyond your business operations and IT security to that of your suppliers and vendors.

The agribusiness supply chain is complex. Take the fresh produce industry, encompassing the grower, processor, distributor, and retailer (in addition to logistics, cooling, packaging procurement, shipping, and more). All are crucial and if one participant is disrupted or missing, it can result in big losses of product and revenue.

[/et_pb_text][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” quote_font_size=”22px” quote_line_height=”1.3em” background_color=”#f7f7f7″ width=”90%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_padding=”||||false|false”]

Here’s another way to think about it: Your suppliers’ security is now your security.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ disabled_on=”on|on|off” _builder_version=”4.9.3″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2021/01/sidebar-industry-fresh-produce-apples.jpg” box_shadow_style=”preset2″ box_shadow_spread=”-7px”][et_pb_divider show_divider=”off” _builder_version=”4.7.0″ _module_preset=”default” custom_padding_tablet=”150px||150px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][/et_pb_divider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|tablet” _builder_version=”4.7.0″ _module_preset=”default” background_enable_color=”off” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/background-gray-v2.jpg” custom_padding=”70px||70px||true|” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=”” background_last_edited=”on|desktop” background_enable_image_tablet=”off”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”on|desktop” _builder_version=”4.9.3″ _module_preset=”default” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false” custom_padding_tablet=”0px||||false|false” custom_padding_phone=”0px||0px||false|false”][et_pb_column type=”1_2″ _builder_version=”4.9.3″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2021/02/agribusiness-pillar-page-image-3.jpg” custom_padding=”||||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_last_edited=”off|desktop”][et_pb_divider show_divider=”off” _builder_version=”4.7.0″ _module_preset=”default” custom_padding_tablet=”150px||150px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][/et_pb_divider][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”||||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” quote_font_size=”18px” header_2_font_size=”36px” width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone”]

Supply Chain Risk Assessment

Conducting a supply chain risk assessment within an agriculture-focused company begins with looking at the company’s supply chain and mapping it to identify dependencies, how vendors fit into the overall picture, and whether holes exist.

Supply Chain Risk Management

Supply chain risk management takes the information collected from the assessment stage and identifies potential influences and “blockers” to the supply chain that can affect activity. It takes strategic steps try to alleviate interruption to the supply chain process.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/bavkground-gray.jpg” custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||0px||false|false” custom_padding_phone=”||0px||false|false” background_last_edited=”on|desktop” background_enable_image_tablet=”off”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”off|desktop” _builder_version=”4.9.3″ _module_preset=”default” background_enable_image=”off” custom_padding=”1px||1px||true|false” custom_padding_tablet=”||20px||false|false” custom_padding_phone=”50px||20px||false|false”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”30px||30px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” text_font_size=”20px” quote_font_size=”18px” header_2_font_size=”36px” width=”98%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone”]

How to Identify Vendor Risk

Engaging in third-party risk assessments offer continuous cyber risk management for your business, instantly identifying vulnerabilities, and advanced cyber threats that can take down your supply chain.

But identification is only the first step. What comes next is engaging with a trusted IT partner who can take the results and translate them into actionable insights that help your entire organization manage risk.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ disabled_on=”on|on|off” _builder_version=”4.9.3″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2021/01/sidebar-industry-professional-services-02.jpg” box_shadow_style=”preset2″ box_shadow_spread=”-7px”][et_pb_divider show_divider=”off” _builder_version=”4.7.0″ _module_preset=”default” custom_padding_tablet=”150px||150px||true|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone”][/et_pb_divider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|tablet” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#f7f7f7″ custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”70px||70px|||” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=””][et_pb_row custom_padding_last_edited=”on|tablet” _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”0px||40px||false|false” custom_padding_tablet=”” custom_padding_phone=””][et_pb_column type=”4_4″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text _builder_version=”4.7.0″ _module_preset=”default” quote_font_size=”18px” header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_2_text_align=”center” header_2_font_size=”36px” width=”96%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||||false|false” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” header_2_text_align_tablet=”left” header_2_text_align_phone=”center” header_2_text_align_last_edited=”on|phone” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone”]

Risk Management: How It Works

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”0px||0px|||”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb title=”Identify The Risk” image=”https://www.zagtech.com/wp-content/uploads/2020/11/icon-reliability.png” alt=”Hexagonal icon with illustration of reliability icon” icon_placement=”left” image_max_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”left” icon_placement_last_edited=”on|phone” image_max_width_tablet=”” image_max_width_phone=”75px” image_max_width_last_edited=”on|phone” _builder_version=”4.9.3″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||||false|false” header_text_align_phone=”center” header_text_align_last_edited=”off|desktop” body_text_align_tablet=”” body_text_align_phone=”left” body_text_align_last_edited=”on|phone” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Engage with an external third party to assess vendor risk.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb title=”Prioritize Partners” image=”https://www.zagtech.com/wp-content/uploads/2020/12/lower-cost-icon.png” alt=”Hexagonal icon with illustration of lower-cost-icon” icon_placement=”left” image_max_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”left” icon_placement_last_edited=”on|phone” image_max_width_tablet=”” image_max_width_phone=”75px” image_max_width_last_edited=”on|phone” _builder_version=”4.9.3″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||||false|false” custom_padding=”||0px|||” header_text_align_phone=”center” header_text_align_last_edited=”off|desktop” body_text_align_tablet=”” body_text_align_phone=”left” body_text_align_last_edited=”on|phone” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Identify vendors based on their potential business impact.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.8.0″ _module_preset=”default” custom_margin=”40px||||false|false” custom_padding=”0px||0px|||”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb title=”Collect More Information” image=”https://www.zagtech.com/wp-content/uploads/2020/12/planning-icon.png” alt=”A hexagonal icon with an illustration of a planning icon” icon_placement=”left” image_max_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”left” icon_placement_last_edited=”on|phone” image_max_width_tablet=”” image_max_width_phone=”75px” image_max_width_last_edited=”on|phone” _builder_version=”4.9.3″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||||false|false” header_text_align_phone=”center” header_text_align_last_edited=”off|desktop” body_text_align_tablet=”” body_text_align_phone=”left” body_text_align_last_edited=”on|phone” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

For at-risk vendors, determine risk levels and circumstances that can affect processing.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb title=”ESTABLISH CLEAR COMMUNICATION” image=”https://www.zagtech.com/wp-content/uploads/2020/11/icon-flexibility.png” icon_placement=”left” image_max_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”left” icon_placement_last_edited=”on|phone” image_max_width_tablet=”” image_max_width_phone=”75px” image_max_width_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||||false|false” header_text_align_phone=”center” header_text_align_last_edited=”off|desktop” body_text_align_tablet=”” body_text_align_phone=”left” body_text_align_last_edited=”on|phone” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Create processes, procedures, and policies to help vendors improve at-risk behaviors.

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.9.3″ _module_preset=”default” background_color=”#ffffff” custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||50px||false|false” custom_padding_phone=””][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”0px||1px|||”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2021/04/blog-risk-assessment-supply-chain-500w.png” alt=”Screenshot of blog post about supply chain it risk assessment” title_text=”blog-risk-assessment-supply-chain-500w” _builder_version=”4.9.3″ _module_preset=”default” width=”300px” module_alignment=”center”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” quote_font_size=”18px” width=”95%” width_tablet=”100%” width_phone=”” width_last_edited=”on|tablet” custom_margin=”||30px||false|false” custom_margin_tablet=”40px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone”]

The Supply Chain Journey

What do Dutch supermarkets running out of cheese and cold storage company Americold being unable to assign trucks to a door have in common? Separate cyberattacks in both cases.

The fallout? Business interruptions preventing trucks from shipping, produce reaching retail shelves, and lost revenue through the entire supply chain.

Learn more about assessing and managing supply chain IT risk in our series on the blog.

[/et_pb_text][et_pb_button button_url=”/news/risk-assessment-supply-chain/” button_text=”Read the Blog” button_alignment=”left” button_text_last_edited=”off|desktop” _builder_version=”4.9.3″ _module_preset=”default” custom_button=”on” button_text_size=”15px” button_text_color=”#ffffff” button_bg_color=”#1dc690″ button_border_color=”#1dc690″ button_border_radius=”0px” button_font=”Proxima Nova – Regular|500||on|||||” button_use_icon=”off” custom_padding=”10px|25px|10px|25px|true|true” custom_padding_tablet=”” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” button_bg_color__hover_enabled=”on|desktop” button_bg_color__hover=”#145da1″ button_bg_enable_color__hover=”on” button_border_color__hover_enabled=”on|desktop” button_border_color__hover=”#145da1″ custom_css_main_element_last_edited=”on|phone”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.7.0″ _module_preset=”default” background_color=”#f7f7f7″ module_alignment=”center” custom_margin=”0px||||false|false” custom_margin_tablet=”70px||||false|false” custom_margin_last_edited=”off|desktop” custom_padding=”0px||0px||false|false”][et_pb_row column_structure=”2_5,3_5″ custom_padding_last_edited=”on|desktop” _builder_version=”4.7.0″ _module_preset=”default” background_color=”#f7f7f7″ width=”100%” width_tablet=”80%” width_phone=”” width_last_edited=”on|phone” max_width=”none” custom_padding=”0px||0px||false|false” custom_padding_tablet=”70px||70px||false|false” custom_padding_phone=”||70px||false|false”][et_pb_column type=”2_5″ disabled_on=”on|on|off” _builder_version=”4.7.0″ _module_preset=”default”][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2020/12/business-application-image-4.png” alt=”A businessman and business woman standing side by side and looking at a laptop.” title_text=”business-application-image-4″ _builder_version=”4.9.3″ _module_preset=”default” position_origin_a=”center_left” width=”324px” custom_margin=”-117px||-1px||false|false” custom_padding=”||0px||false|false”][/et_pb_image][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”108px||108px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”0px||0px||false|false” custom_padding_last_edited=”on|phone” custom_css_main_element_last_edited=”off|phone”][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” header_2_font_size=”36px” header_4_line_height=”1.3em” width=”600px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”left” custom_margin=”||40px||false|false” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone”]

Reduce Your Supply Chain Risk

[/et_pb_text][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” quote_font_size=”18px” header_4_text_color=”#1dc690″ width=”600px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”left” custom_margin=”-42px||25px||false|false” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone”]

Your suppliers’ security is now your security. Learn which suppliers are a risk to your business.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/bavkground-gray.jpg” custom_margin=”70px||70px||true|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||0px||false|false” custom_padding_phone=”||0px||false|false” background_last_edited=”on|desktop” background_enable_image_tablet=”off”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” custom_padding_last_edited=”off|desktop” _builder_version=”4.9.0″ _module_preset=”default” custom_padding=”1px||1px||true|false” custom_padding_tablet=”||20px||false|false” custom_padding_phone=”50px||20px||false|false”][et_pb_column type=”1_2″ _builder_version=”4.9.0″ _module_preset=”default” custom_padding=”||||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_last_edited=”off|desktop”][et_pb_text _builder_version=”4.9.3″ _module_preset=”default” text_font_size=”20px” quote_font_size=”18px” header_2_font_size=”36px” width=”98%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” hover_enabled=”0″ sticky_enabled=”0″]

The U.S. Department of Homeland Security labeled agribusiness one of 16 critical infrastructures at a higher risk for a cyberattack than other sectors.

While technology is enabling supply chains to be more operationally efficient, poorly managed IT systems and software can lead to cyber breaches, interrupted operations, and downtime severely impacting your revenue.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ disabled_on=”off|off|off” _builder_version=”4.9.0″ _module_preset=”default” background_enable_image=”off”][et_pb_video src=”https://www.zagtech.com/wp-content/uploads/2021/05/zag-supply-chain-risk-management.mp4″ image_src=”https://www.zagtech.com/wp-content/uploads/2021/02/agribusiness-hero-image.jpg” use_icon_font_size=”on” icon_font_size=”65px” _builder_version=”4.9.3″ _module_preset=”default” custom_margin=”20px||||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|tablet” box_shadow_style=”preset2″ box_shadow_color=”rgba(0,0,0,0.1)”][/et_pb_video][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.7.0″ _module_preset=”default” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=””][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.9.3″ _module_preset=”default” custom_padding=”0px||0px||true|false”][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_blurb title=”Contact Our IT Security & Compliance Team” use_icon=”on” _builder_version=”4.9.3″ _module_preset=”default”]ZAG’s expert IT Security & Compliance team have years of experience working with agribusinesses—and many other industries—helping them meet IT standards critical to their success. To learn more about supply chain risk assessment and management, contact us today. We are here to help. [/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.7.0″ _module_preset=”default”][et_pb_code _builder_version=”4.9.3″ _module_preset=”default”][/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section]

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare