{"id":6895,"date":"2021-09-15T18:38:09","date_gmt":"2021-09-15T13:08:09","guid":{"rendered":"https:\/\/zv3d.wpengine.com\/us\/?p=6895"},"modified":"2024-12-18T15:46:51","modified_gmt":"2024-12-18T10:16:51","slug":"zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security","status":"publish","type":"post","link":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/","title":{"rendered":"Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive alignnone wp-image-6896 size-full\" src=\"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2024\/11\/tech-stack.png\" alt=\"\" width=\"1606\" height=\"782\" srcset=\"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2024\/11\/tech-stack.png 1606w, https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2024\/11\/tech-stack-300x146.png 300w, https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2024\/11\/tech-stack-1024x499.png 1024w, https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2024\/11\/tech-stack-768x374.png 768w, https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2024\/11\/tech-stack-1536x748.png 1536w\" sizes=\"auto, (max-width: 1606px) 100vw, 1606px\" \/><\/p>\n<p>Zeta is in the business of providing a full-stack, cloud-native, API-first neo-banking platform including a digital core and a payment engine for issuance of credit, debit, and prepaid products. These products enable legacy banks and new-age fintech institutions to launch modern retail and corporate fintech products.<\/p>\n<p>Zeta currently provides its platform and products to BFSI issuers in India, Asia, and LATAM. Zeta\u2019s products are used by banks such as RBL Bank, IDFC First Bank, and Kotak Mahindra Bank, 14000 corporates, and over 2 million users. Zeta is a SOC 2, ISO 27001, ISO 9001:2008, PCI DSS certified company.<\/p>\n<p>How does Zeta continuously deliver at these high levels without compromising on security? Let us take a look at Zeta\u2019s tech stack to find out.<\/p>\n<h2 class=\"wp-block-heading\">Server Applications<\/h2>\n<p>A server application is designed to install, operate, and host applications and associated services for end-users.<\/p>\n<h3 class=\"wp-block-heading\">Compute Runtimes<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Kubernetes, GitOps, Apache Openwhisk, Apache Flink, and Camunda.\u00a0<\/em><\/p>\n<p>Following are the runtime applications in Zeta.<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Atlantis<\/strong>\u00a0is a docker runtime container deployed using GitOps based end-to-end orchestration with the help of Kubernetes.<\/li>\n<li><strong>Aster<\/strong>\u00a0is an open-source serverless platform run on Apache Openwhisk that runs various short-lived jobs on-demand.<\/li>\n<li><strong>Rhea<\/strong>\u00a0is an application used to execute BPMN workflows that run on the Camunda platform.<\/li>\n<li><strong>Perseus<\/strong>\u00a0is an adaptation of Apache Flink to run complex event processing tasks. Apache Flink is a framework and processing engine used for computations at any scale.<\/li>\n<\/ul>\n<p>We use\u00a0<strong>Camunda<\/strong>\u00a0to define workflows and automate decision-making.<\/p>\n<p>Apache Flink provides a high-throughput, low-latency streaming engine and supports event-time processing and state management. It has allowed us to perform computations at any scale.<\/p>\n<h3 class=\"wp-block-heading\">Cluster Management<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Kubernetes, Kong, and Calico.<\/em><\/p>\n<p>A cluster management tool is an essential service used to group the clusters and nodes. This is used to:<\/p>\n<ul class=\"wp-block-list\">\n<li>Monitor nodes in the cluster.<\/li>\n<li>Configure services.<\/li>\n<li>Administer cluster services.<\/li>\n<\/ul>\n<p>We prefer using open-source systems in our tech stack. That is why we use Kubernetes as our orchestration system to efficiently manage and deploy containers.<\/p>\n<p><strong>Ingress<\/strong>\u00a0and API Gateways run using Kong. Kong supports high availability clusters and an extensive range of plugins to address various concerns like authentication, security, and monitoring.<\/p>\n<p>We have also developed 2 in-house tools, Sprinkler and Hades. Sprinkler is our Egress gateway and Hades is our file input\/output gateway.<\/p>\n<p>We use the Calico plugin to manage the container network interface.<\/p>\n<p>We are evaluating Istio to adopt it as our open service mesh. A service mesh controls how different parts of an application share data with each other.<\/p>\n<h3 class=\"wp-block-heading\">Messaging Infrastructure<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Apache Kafka, Apache Nifi, Apache Flink, KSQL, and Kafka.<\/em><\/p>\n<p>A messaging system transfers data from one application to another. We use the following components to seamlessly transfer messages within Zeta\u2019s various applications and clusters.<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Apache Kafka<\/strong>\u00a0is used as a message broker. It allows us to handle high volumes of data and passes messages from one end to the other.<\/li>\n<li><strong>Atropos<\/strong>\u00a0is a message-based integration bus based on Kafka developed by Zeta.<\/li>\n<li>Apache Nifi is used to implement ETL Pipelines.<\/li>\n<li><strong>Perseus<\/strong>, developed by Zeta, uses Apache Flink to process complex events.<\/li>\n<li><strong>Sinope\u00a0<\/strong>uses KSQL and Kafka connectors to bridge the message\/event world and the batch\/file world. KSQL and Kafka connectors enable rich data integration and streaming.<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\">Data Stores<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Postgresql, Amazon S3, Amazon RedShift, ClickHouse, and Redis.<\/em><\/p>\n<p>Postgresql is used to store transactional data and Amazon S3 is our data lake. We use Amazon RedShift and ClickHouse as our data warehouse and Redis, an open-source memory data structure, to store cache.<\/p>\n<p>Application Performance Monitoring (APM) and Business Performance Monitoring (BPM) uses the ElasticSearch engine.<\/p>\n<h3 class=\"wp-block-heading\">Data Processing<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Presto SQL, Sparta, and Apache Superset.<\/em><\/p>\n<p>The data processing unit is an essential part of any server application. It converts data available in the system (machine-readable data) to a human-readable format.<\/p>\n<p>We use the Presto SQL query engine to process big data and Sparta for stream processing. Stream processing allows us to convert data in motion directly to continuous streams.<\/p>\n<p>The Power Centre stores various data models and allows us to modify data and enables the reuse of data. The Power Centre is an adaption of Apache Superset.<\/p>\n<h3 class=\"wp-block-heading\">CI\/CD<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Jenkins, ArgoCD, and Sonarqube.<\/em><\/p>\n<p>Jenkins is used for Continuous Integration (CI) and ArgoCD for Continuous Deployment (CD).<\/p>\n<p>Our servers use Sonarqube, an open-source platform, for static code analysis.<\/p>\n<h3 class=\"wp-block-heading\">Observability<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Grafana, Kibana, Fluentd, and Hypertrace.<\/em><\/p>\n<p>Observability is defined as the ability of the internal states of a system to be determined by its external outputs. External outputs can be anything such as alerts, visual representation, and\u00a0 infrastructure tracing.<\/p>\n<p>We have developed\u00a0<strong>Prometheus<\/strong>\u00a0as our event monitoring system. Prometheus stores all metrics in the database.<\/p>\n<p>We use Grafana for our dashboards and alerts and Kibana for log analysis. The purpose of both these applications is to visualize and navigate data. We also use Fluentd, an open-source data collector, for logs and metrics collection.<\/p>\n<p>All applications should have a distributed tracing system. Hypertrace is our tracing system. It helps us debug applications and\u00a0log information about their execution.<\/p>\n<h3 class=\"wp-block-heading\">Security Monitoring<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>HELK and Jackhammer.<\/em><\/p>\n<p>Security monitoring is another essential unit to analyze data to detect any suspicious behavior or changes to the network.<\/p>\n<p>HELK is an ELK (Elasticsearch, Logstash &amp; Kibana) stack with advanced hunting analytic capabilities provided by the implementation of Spark and Graphframes technologies.<\/p>\n<p>Kratos, an in-house adaption of Jackhammer, is our Security CI.<\/p>\n<p>We are evaluating RockNSM, a\u00a0premier sensor platform for Network Security Monitoring (NSM) hunting and incident response (IR) operations.<\/p>\n<h3 class=\"wp-block-heading\">Hardware Security Module (HSM)<\/h3>\n<p><strong>Technology used<\/strong>:\u00a0<em>Safenet, Gemalto and nCipher\/ Entrust nShield Solo.<\/em><\/p>\n<p>HSM manages digital keys, encryption and decryption, and provides strong authentication. We use the following HSMs:<\/p>\n<ul class=\"wp-block-list\">\n<li>Safenet and Gemalto as Network HSM.<\/li>\n<li>nCipher\/ Entrusy nShield Solo.<\/li>\n<li><strong>Harpocrates<\/strong>, developed by Zeta, is our HSM as a service interface.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Mobile Application<\/h2>\n<p><strong>Technology used<\/strong>:\u00a0<em>Firebase Hosting, Websockets, HTTPS.<\/em><\/p>\n<p><strong>Languages used<\/strong>:\u00a0<em>Kotlin, Java, Objective C, Swift.<\/em><\/p>\n<p>We develop mobile applications as native apps, React Native apps, and web apps.<\/p>\n<p>Kotlin and Java are used to develop our Android applications and Objective C and Swift for our iOS applications.<\/p>\n<p>Firebase Hosting helps with Analytics and Crash detection in the server. Websockets and HTTPS make it possible for two-way communication between the server and the user.<\/p>\n<h2 class=\"wp-block-heading\">Web Applications<\/h2>\n<p><strong>Technology used<\/strong>:\u00a0<em>Typescript, SCSS transpilers, Vue.js, Bulma, Buefy, Webpack, Rollup, Verdaccio, Lerna, and Sentry.<\/em><\/p>\n<p><strong>Languages used<\/strong>:\u00a0<em>HTML, CSS, Javascript, Node JS, and Express JS<\/em><\/p>\n<p>We use HTML, CSS, Javascript, Node JS, and Express JS to develop our web applications.<\/p>\n<p>Typescript and SCSS transpilers convert program code from one language to another.<\/p>\n<p>Vue.js is our Javascript framework and Bulma is our CSS framework. Buefy is a user interface component and is made using both Bulma and Vue js. Webpack and Rollup are the JavaScript build tools.<\/p>\n<p>Verdaccio, an NPM registry, serves the purpose of a Private NPM repository. The repository is managed by Lerna, a workflow optimization tool. Sentry, an Application monitoring tool, is used to monitor errors.<\/p>\n<h2 class=\"wp-block-heading\">Cyber Security<\/h2>\n<p><strong>Technology used<\/strong>:\u00a0<em>Trivy,\u00a0Clair,\u00a0CloudSploit,\u00a0MobSF,\u00a0ZAP<\/em><\/p>\n<p>The challenge when building a product is how we balance ease of use with security. At Zeta, we use\u00a0Trivy for CI docker scanning and Clair for CD docker scanning.<\/p>\n<p>CloudSploit is our Cloud Security Posture Management.\u00a0 We use MobSF for mobile application security.<\/p>\n<p>ZAP for web applications is all in CI\/CD.<\/p>\n<h2 class=\"wp-block-heading\">Best Tech Stack = Best Performance?<\/h2>\n<p>Building a system that can provide these functionalities and process over 1 million transactions per second is not easy. While Zeta uses the best tech stack, building a robust framework to continuously deliver at the highest levels without compromising on security would not have been possible without Zeta\u2019s talented engineers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zeta&#8217;s comprehensive tech stack enables over 1 million transactions per second with top-tier security and cutting-edge technologies, ensuring robust and scalable financial services.<\/p>\n","protected":false},"author":11,"featured_media":7088,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-engg.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[49],"tags":[],"class_list":["post-6895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v25.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security - Zeta US<\/title>\n<meta name=\"description\" content=\"Zeta&#039;s tech stack powers 1M+ transactions per second with top-tier security, ensuring scalable financial services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security\" \/>\n<meta property=\"og:description\" content=\"Zeta&#039;s tech stack powers 1M+ transactions per second with top-tier security, ensuring scalable financial services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Zeta US\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LifeAtZeta\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-15T13:08:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-18T10:16:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2021\/09\/Zeta\u0393COs-Robust-Tech-Stack_-Delivering-High-Performance-with-Uncompromised-Security-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Team Zeta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/zetasuite\" \/>\n<meta name=\"twitter:site\" content=\"@zetasuite\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security - Zeta US","description":"Zeta's tech stack powers 1M+ transactions per second with top-tier security, ensuring scalable financial services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/","og_locale":"en_US","og_type":"article","og_title":"Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security","og_description":"Zeta's tech stack powers 1M+ transactions per second with top-tier security, ensuring scalable financial services.","og_url":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/","og_site_name":"Zeta US","article_publisher":"https:\/\/www.facebook.com\/LifeAtZeta\/","article_published_time":"2021-09-15T13:08:09+00:00","article_modified_time":"2024-12-18T10:16:51+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2021\/09\/Zeta\u0393COs-Robust-Tech-Stack_-Delivering-High-Performance-with-Uncompromised-Security-1.png","type":"image\/png"}],"author":"Team Zeta","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/zetasuite","twitter_site":"@zetasuite","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#article","isPartOf":{"@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/"},"author":{"name":"Team Zeta","@id":"https:\/\/www.zeta.tech\/us\/#\/schema\/person\/c53461c9d9812d486a10122752f61b35"},"headline":"Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security","datePublished":"2021-09-15T13:08:09+00:00","dateModified":"2024-12-18T10:16:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/"},"wordCount":1290,"commentCount":0,"publisher":{"@id":"https:\/\/www.zeta.tech\/us\/#organization"},"image":{"@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2021\/09\/Zeta\u0393COs-Robust-Tech-Stack_-Delivering-High-Performance-with-Uncompromised-Security.png","articleSection":["Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/","url":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/","name":"Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security - Zeta US","isPartOf":{"@id":"https:\/\/www.zeta.tech\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#primaryimage"},"image":{"@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2021\/09\/Zeta\u0393COs-Robust-Tech-Stack_-Delivering-High-Performance-with-Uncompromised-Security.png","datePublished":"2021-09-15T13:08:09+00:00","dateModified":"2024-12-18T10:16:51+00:00","description":"Zeta's tech stack powers 1M+ transactions per second with top-tier security, ensuring scalable financial services.","breadcrumb":{"@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#primaryimage","url":"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2021\/09\/Zeta\u0393COs-Robust-Tech-Stack_-Delivering-High-Performance-with-Uncompromised-Security.png","contentUrl":"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2021\/09\/Zeta\u0393COs-Robust-Tech-Stack_-Delivering-High-Performance-with-Uncompromised-Security.png","width":600,"height":378},{"@type":"BreadcrumbList","@id":"https:\/\/www.zeta.tech\/us\/resources\/blog\/zetas-robust-tech-stack-delivering-high-performance-with-uncompromised-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.zeta.tech\/us\/"},{"@type":"ListItem","position":2,"name":"Zeta\u2019s Robust Tech Stack: Delivering High Performance with Uncompromised Security"}]},{"@type":"WebSite","@id":"https:\/\/www.zeta.tech\/us\/#website","url":"https:\/\/www.zeta.tech\/us\/","name":"Zeta US","description":"Launch Next-Gen Credit Cards With Zeta","publisher":{"@id":"https:\/\/www.zeta.tech\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.zeta.tech\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.zeta.tech\/us\/#organization","name":"Zeta","url":"https:\/\/www.zeta.tech\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.zeta.tech\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2022\/02\/logo-white-xx.png","contentUrl":"https:\/\/www.zeta.tech\/us\/wp-content\/uploads\/sites\/2\/2022\/02\/logo-white-xx.png","width":114,"height":46,"caption":"Zeta"},"image":{"@id":"https:\/\/www.zeta.tech\/us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LifeAtZeta\/","https:\/\/x.com\/zetasuite","https:\/\/www.linkedin.com\/company\/zetasuite\/"]},{"@type":"Person","@id":"https:\/\/www.zeta.tech\/us\/#\/schema\/person\/c53461c9d9812d486a10122752f61b35","name":"Team Zeta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.zeta.tech\/us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4167de5b0a18bf54bbed35289788cbca3a1e16a9ba9a3c0aedffbdecd91c1df?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4167de5b0a18bf54bbed35289788cbca3a1e16a9ba9a3c0aedffbdecd91c1df?s=96&d=mm&r=g","caption":"Team Zeta"},"description":"Meet Team Zeta, a diverse group of experts who regularly contribute their insights to our blog. From banking trends to regulatory compliance, each Zetanaut brings a unique perspective to the table. Stay ahead of the curve by following our blog for the latest industry knowledge and expertise from Team Zeta.","sameAs":["https:\/\/www.linkedin.com\/company\/zetasuite","https:\/\/x.com\/https:\/\/twitter.com\/zetasuite"],"url":"https:\/\/www.zeta.tech\/us\/resources\/blog\/author\/teamzeta\/"}]}},"_links":{"self":[{"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/posts\/6895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/comments?post=6895"}],"version-history":[{"count":0,"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/posts\/6895\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/media\/7088"}],"wp:attachment":[{"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/media?parent=6895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/categories?post=6895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zeta.tech\/us\/wp-json\/wp\/v2\/tags?post=6895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}