Looking for instructor-led training?
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to...
Add users to an application and assign users to roles based on how they interact with a case.
Learn how you can configure role-based access control by using the Access Manager.
Learn about low-code development and review how Pega Low-Code App Factory aids in effectively scaling low-code in an enterprise.
Data is an important asset that must be protected from unauthorized access and use. Client-based access control manages how data is used to comply...
Pega Platform™ automatically tracks actions performed, such as which operators worked on a case and when. You can enhance this capability by using...
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.