[LP] Inside ZAG Standards

[et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” module_class=”top-banner” _builder_version=”4.16″ _module_preset=”default” background_color=”#f7f7f7″ use_background_color_gradient=”on” background_color_gradient_stops=”rgba(0,0,0,0.4) 0%|rgba(0,0,0,0.29) 100%” background_color_gradient_overlays_image=”on” background_color_gradient_start=”rgba(0,0,0,0.4)” background_color_gradient_end=”rgba(0,0,0,0.29)” background_image=”https://www.zagtech.com/wp-content/uploads/2022/02/zag-web-header-abstract.jpg” custom_padding=”90px||70px||false|” custom_padding_tablet=”50px||25px||false|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||0px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_text_color=”#ffffff” header_font_size=”50px” header_4_line_height=”1.3em” width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||8px||false|false” header_font_size_tablet=”35px” header_font_size_phone=”” header_font_size_last_edited=”on|phone” global_colors_info=”{}”]

Inside ZAG Standards

[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_4_font=”Proxima Nova – Regular||||||||” header_4_text_color=”#ffffff” header_4_font_size=”22px” width=”61%” custom_margin=”||15px||false|false” global_colors_info=”{}”]

Guiding Technology Strategy

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” background_image=”https://www.zagtech.com/wp-content/uploads/2020/11/bavkground-gray.jpg” custom_margin=”70px||||false|false” custom_margin_tablet=”0px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”75px||75px||true|” global_colors_info=”{}”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||0px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” quote_font_size=”18px” header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_2_text_align=”left” width=”100%” width_tablet=”100%” width_last_edited=”off|desktop” module_alignment=”center” custom_margin=”||||false|false” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” header_2_text_align_tablet=”left” header_2_text_align_last_edited=”off|desktop” text_orientation_tablet=”left” text_orientation_last_edited=”off|desktop” global_colors_info=”{}” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone”]

Implementing best practices within your IT environment – from your workstations to management strategies and everything in between – ensures that your technology is optimized and delivering on its promise as a competitive advantage for your business.

From disaster recovery best practices to ongoing maintenance essentials, ZAG uses more than 200 documented standards as a roadmap for our work, surrounding every client with the resources and service they need to succeed.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2020/12/systems-management-image-3.jpg” alt=”An open concept office environment with employees working side by side with their peers” title_text=”systems management image 3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”default” background_enable_image=”off” custom_margin=”||||false|false” custom_margin_tablet=”0px||0px||true|false” custom_margin_last_edited=”off|desktop” custom_padding=”90px||130px||false|false” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=”” background_last_edited=”on|desktop” background_enable_image_tablet=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_margin=”||25px||false|false” custom_padding=”0px||0px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_text_color=”#ffffff” header_font_size=”50px” header_4_line_height=”1.3em” text_orientation=”center” width=”100%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||8px||false|false” header_font_size_tablet=”35px” header_font_size_phone=”” header_font_size_last_edited=”on|phone” global_colors_info=”{}”]

ZAG Creates & Regularly Reviews Standards

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ custom_padding_last_edited=”on|tablet” _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||0px|||” custom_padding_tablet=”||0px||false|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Active Directory” image=”https://www.zagtech.com/wp-content/uploads/2020/12/communications-icon.png” alt=”Hexagonal icon with illustration of communications icon.” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16.1″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” width=”96%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”||||false|false” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Without the proper standards in place, Active Directory can be a breeding ground for security concerns causing data breaches, harmful malware infiltrations, accidental changes, and more.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Disaster Recovery” image=”https://www.zagtech.com/wp-content/uploads/2020/12/recovery-icon.png” alt=”Hexagonal icon with illustration of recovery icon” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” content_max_width_tablet=”” content_max_width_phone=”” content_max_width_last_edited=”on|desktop” _builder_version=”4.16.1″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” custom_margin=”||||false|false” custom_padding_tablet=”25px||||false|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Having a disaster recovery plan to protect your business from unforeseen outages can help you avoid opening yourself up to data loss and downtime, two things no business leader wants to think about.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ custom_padding_last_edited=”on|tablet” _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||0px|||” custom_padding_tablet=”||0px||false|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Email” image=”https://www.zagtech.com/wp-content/uploads/2020/11/mobile-solutions-icon.png” alt=”Hexagonal icon with illustration of mobile solutions icon.” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16.1″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” width=”92%” width_tablet=”100%” width_phone=”100%” width_last_edited=”on|phone” custom_margin=”50px||||false|false” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Keep email communications secure to preventing hackers from accessing personal data like user credentials, accounting data, credit card numbers, and other PII.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Network Security” image=”https://www.zagtech.com/wp-content/uploads/2020/12/secure-icon.png” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” width=”95%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”50px||||false|false” custom_padding=”||||false|false” custom_padding_tablet=”||||false|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Keeping firmware up to date on all physical equipment, as well as creating one cohesive network architecture, are two standards that govern network security best practices.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ custom_padding_last_edited=”on|tablet” _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||0px|||” custom_padding_tablet=”||0px||false|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Servers” image=”https://www.zagtech.com/wp-content/uploads/2020/12/on-premise-icon.png” alt=”Hexagonal icon with illustration of on premise icon.” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16.1″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” width=”92%” width_tablet=”100%” width_phone=”100%” width_last_edited=”on|phone” custom_margin=”50px||||false|false” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Servers are central to the storage of a company’s critical information, requiring robust standards aimed at protecting data from being breached or lost due to an outages or equipment failure.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Workstations” image=”https://www.zagtech.com/wp-content/uploads/2020/12/collaboration-icon.png” alt=”Hexagonal icon with illustration of collaboration icon.” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16.1″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” width=”95%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”50px||||false|false” custom_padding=”||||false|false” custom_padding_tablet=”||||false|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Managing workstations and the devices used in day-to-day business operations requires accurate record-keeping, consistent patching, maintenance, and regular backups to prevent data loss.

[/et_pb_blurb][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ custom_padding_last_edited=”on|tablet” _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||0px|||” custom_padding_tablet=”||0px||false|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Asset Management” image=”https://www.zagtech.com/wp-content/uploads/2020/12/planning-icon.png” alt=”A hexagonal icon with an illustration of a planning icon” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16.1″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” width=”92%” width_tablet=”100%” width_phone=”100%” width_last_edited=”on|phone” custom_margin=”50px||||false|false” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Standards for managing IT assets and technical strategy help improve business development and align with your company’s budget, saving your business both time and money.

[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb title=”Wireless” image=”https://www.zagtech.com/wp-content/uploads/2020/11/virtualization-icon.png” alt=”Hexagonal icon with illustration of virtualization icon.” icon_placement=”left” image_icon_width=”105px” content_max_width=”100%” icon_placement_tablet=”” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_icon_width_tablet=”105px” image_icon_width_phone=”105px” image_icon_width_last_edited=”on|phone” _builder_version=”4.16.1″ _module_preset=”1d3ddadd-4a9f-4109-a871-415e8da60b17″ header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_text_color=”#145da1″ body_font=”Neue Haas Unica||||||||” body_text_color=”#333333″ image_icon_custom_padding_tablet=”” image_icon_custom_padding_phone=”” image_icon_custom_padding_last_edited=”on|phone” width=”95%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” custom_margin=”50px||||false|false” custom_padding=”||||false|false” custom_padding_tablet=”||||false|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” body_text_align_tablet=”” body_text_align_phone=”center” body_text_align_last_edited=”on|phone” border_width_all_image_tablet=”” border_width_all_image_phone=”” border_width_all_image_last_edited=”on|phone” image_max_width=”105px” image_max_width_tablet=”” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone” global_colors_info=”{}” custom_css_blurb_image_last_edited=”on|desktop” child_filter_hue_rotate__hover_enabled=”off|hover” child_filter_saturate__hover_enabled=”off|desktop”]

Wireless networks can open businesses up to threats from unauthorized devices gaining access to internal networks. Strong security protocols can guide placement and configuration of networks.

[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” _builder_version=”4.16.1″ _module_preset=”default” background_color=”#f7f7f7″ min_height=”737.2px” custom_padding=”70px||70px||true|false” custom_padding_tablet=”50px||50px||true|false” custom_padding_phone=”” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px||0px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” quote_font_size=”18px” header_font=”Proxima Nova – Regular|600||on|||||” header_text_align=”left” header_2_text_align=”center” header_2_font_size=”36px” width=”96%” width_tablet=”100%” width_phone=”” width_last_edited=”on|phone” module_alignment=”center” custom_margin=”||0px||false|false” header_text_align_tablet=”” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” header_2_text_align_tablet=”left” header_2_text_align_phone=”” header_2_text_align_last_edited=”on|phone” global_colors_info=”{}” icon_placement_phone=”top” icon_placement_last_edited=”on|phone” image_max_width_phone=”105px” image_max_width_last_edited=”on|phone”]

Download Our Standards White paper

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ use_custom_gutter=”on” gutter_width=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”40px||1px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2020/12/ZAG-Standards-Cover.png” title_text=”ZAG-Standards-Cover” _builder_version=”4.16″ _module_preset=”default” width=”300px” module_alignment=”center” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” quote_font_size=”18px” width=”95%” width_tablet=”100%” width_phone=”” width_last_edited=”on|tablet” custom_margin=”||30px||false|false” custom_margin_tablet=”40px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” global_colors_info=”{}”]

We’ve outlined our standards practice in a white paper about how we select, test, and establish these standards and work toward continuously improving our services for our clients.

The white paper is a quick read and provides an overview of the areas where you can start to create technology standardization in your business.

[/et_pb_text][et_pb_button button_url=”/wp-content/uploads/2020/12/Zag-Standards-Whitepaper.pdf” button_text=”Download the Whitepaper” button_alignment=”left” button_text_last_edited=”off|desktop” _builder_version=”4.16.1″ _module_preset=”default” custom_button=”on” button_text_size=”15px” button_text_color=”#ffffff” button_bg_color=”#1dc690″ button_border_color=”#1dc690″ button_border_radius=”0px” button_font=”Proxima Nova – Regular|500||on|||||” button_use_icon=”off” custom_padding=”10px||10px||true|false” custom_css_main_element=”width: 275px;||text-align:center;” global_colors_info=”{}” button_bg_color__hover_enabled=”on|desktop” button_bg_color__hover=”#145da1″ button_bg_enable_color__hover=”on” button_border_color__hover_enabled=”on|desktop” button_border_color__hover=”#145da1″ custom_css_main_element_last_edited=”on|phone” custom_css_main_element_tablet=”width: 275px;||text-align:center;” custom_css_main_element_phone=”width: 275px;||text-align:center;”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16.1″ _module_preset=”default” background_color=”#ffffff” max_width=”1920px” module_alignment=”center” custom_margin=”0px||||false|false” custom_margin_tablet=”70px||||false|false” custom_margin_last_edited=”off|desktop” custom_padding=”0px||0px||false|false” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ custom_padding_last_edited=”on|desktop” _builder_version=”4.16″ _module_preset=”default” background_enable_color=”off” width=”100%” width_tablet=”80%” width_phone=”” width_last_edited=”on|phone” max_width=”none” min_height=”436.6px” custom_padding=”0px||0px||false|false” custom_padding_tablet=”70px||70px||false|false” custom_padding_phone=”||70px||false|false” global_colors_info=”{}”][et_pb_column type=”2_5″ disabled_on=”on|on|off” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2020/12/engineering-capabilities-cta.png” alt=”Careers” title_text=”engineering-capabilities-cta” _builder_version=”4.16″ _module_preset=”default” position_origin_a=”center_left” width=”324px” custom_margin=”-117px||-1px||false|false” custom_padding=”||0px||false|false” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”100px||100px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”0px||0px||false|false” custom_padding_last_edited=”on|phone” global_colors_info=”{}” custom_css_main_element_last_edited=”off|phone”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_2_font_size=”36px” header_4_line_height=”1.3em” width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”left” custom_margin=”||40px||false|false” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone” global_colors_info=”{}”]

Want to Learn More

[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” quote_font_size=”18px” width=”550px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”left” custom_margin=”-42px||25px||false|false” header_4_text_color_last_edited=”off|desktop” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone” global_colors_info=”{}”]

Are you interested in learning more about how ZAG uses 200+ defined standards to deliver security, efficiency, and productivity to businesses like yours?

[/et_pb_text][et_pb_button button_url=”/contact” button_text=”Talk to a Strategist Today” button_alignment=”left” button_text_last_edited=”off|desktop” _builder_version=”4.16.1″ _module_preset=”default” custom_button=”on” button_text_size=”15px” button_text_color=”#ffffff” button_bg_color=”#1dc690″ button_border_color=”#1dc690″ button_border_radius=”0px” button_font=”Proxima Nova – Regular|500||on|||||” button_use_icon=”off” custom_padding=”10px||10px||true|false” custom_css_main_element=”width: 275px;||text-align:center;” global_colors_info=”{}” button_bg_color__hover_enabled=”on|desktop” button_bg_color__hover=”#145da1″ button_bg_enable_color__hover=”on” button_border_color__hover_enabled=”on|desktop” button_border_color__hover=”#145da1″ custom_css_main_element_last_edited=”on|phone” custom_css_main_element_tablet=”width: 275px;||text-align:center;” custom_css_main_element_phone=”width: 275px;||text-align:center;”][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” background_color=”#f7f7f7″ module_alignment=”center” custom_margin=”||||false|false” custom_margin_tablet=”0px||||false|false” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”0px||0px||false|false” global_colors_info=”{}”][et_pb_row column_structure=”3_5,2_5″ custom_padding_last_edited=”on|phone” _builder_version=”4.16″ _module_preset=”default” background_color=”#f7f7f7″ width=”100%” width_tablet=”80%” width_phone=”” width_last_edited=”on|phone” max_width=”none” custom_padding=”0px||0px||false|false” custom_padding_tablet=”70px||50px||false|false” custom_padding_phone=”||50px||false|false” global_colors_info=”{}”][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”108px||108px||true|false” custom_padding_tablet=”0px||0px||true|false” custom_padding_phone=”0px||0px||false|false” custom_padding_last_edited=”on|phone” global_colors_info=”{}” custom_css_main_element_last_edited=”on|phone” custom_css_main_element_phone=”padding-top:0px!important;”][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_2_font_size=”36px” header_4_line_height=”1.3em” width=”800px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|desktop” module_alignment=”right” custom_margin=”||40px||false|false” custom_margin_tablet=”” custom_margin_phone=”” custom_margin_last_edited=”on|desktop” custom_padding=”|||250px|false|false” custom_padding_tablet=”|||0px|false|false” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone” global_colors_info=”{}”]

Critical Incident?

[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” quote_font_size=”18px” width=”800px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|phone” module_alignment=”right” custom_margin=”-42px||25px||false|false” custom_padding=”|||250px|false|false” custom_padding_tablet=”|||0px|false|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|phone” global_colors_info=”{}”]

CALL OUR TEAM NOW FOR IMMEDIATE ASSISTANCE

[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” link_font=”Neue Haas Unica|||on|||||” link_text_color=”#ffffff” header_4_line_height=”1.3em” width=”800px” width_tablet=”500px” width_phone=”100%” width_last_edited=”on|tablet” module_alignment=”right” custom_margin=”||||false|false” custom_margin_tablet=”||||false|false” custom_margin_phone=”||50px||false|false” custom_margin_last_edited=”off|desktop” custom_padding=”|||250px|false|false” custom_padding_tablet=”|||0px|false|false” custom_padding_phone=”” custom_padding_last_edited=”on|phone” module_alignment_tablet=”left” module_alignment_phone=”” module_alignment_last_edited=”on|tablet” global_colors_info=”{}”]+1 408.383.2020[/et_pb_text][/et_pb_column][et_pb_column type=”2_5″ disabled_on=”on|on|off” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https://www.zagtech.com/wp-content/uploads/2020/11/careers-cta-image-v3.png” alt=”Careers” title_text=”careers-cta-image-v3″ align=”right” _builder_version=”4.16″ _module_preset=”default” position_origin_a=”center_left” width=”324px” custom_margin=”-120px||-1px||false|false” custom_padding=”||0px||false|false” global_colors_info=”{}”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]

Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare