Skip to main content

Search

Looking for instructor-led training?

Application security

  • Modul

    Application security

    2 Themen

    30 Min.

    Für alle Benutzer sichtbar
  • Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.

Configuring security policies

Digital messaging

  • Modul

    Digital messaging

    4 Themen

    30 Min.

    Für alle Benutzer sichtbar
  • Pega Customer Service offers chat and messaging capabilities that provide flexibility to customers and adaptability for customer service...

Email bot cases and responses

  • Modul

    Email bot cases and responses

    2 Themen

    25 Min.

    Pega Platform 8.7 Für alle Benutzer sichtbar
  • Pega Email Bot can detect the topic or sentiment of an email and route the email to the appropriate operator or queue. Intelligent routing allows the...

Email Manager portal

  • Modul

    Email Manager portal

    5 Themen

    55 Min.

    Pega Platform 8.7 Für alle Benutzer sichtbar
  • The Email Manager portal facilitates the manual processing of emails that do not meet any of the intelligent routing criteria and necessitate triage...

Intelligent routing

  • Modul

    Intelligent routing

    4 Themen

    1 Std.

    Pega Platform 8.7 Für alle Benutzer sichtbar
  • Pega Email Bot™ can detect the topic or sentiment of an email and route the email to the appropriate operator or queue. Intelligent routing allows the...

Inviting users to an application

Managing application access

Pega Email Bot configuration

  • Modul

    Pega Email Bot configuration

    3 Themen

    45 Min.

    Pega Platform 8.7 Für alle Benutzer sichtbar
  • Pega Email Bot™ leverages Pega’s industry-leading natural language processing (NLP) and process automation to interpret, route, audit, and automate...

Securing and auditing data

  • Modul

    Securing and auditing data

    1 Thema

    15 Min.

    Für alle Benutzer sichtbar
  • Data is an important asset that must be protected from unauthorized access and use. Client-based access control manages how data is used to comply...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice