Skip to main content

Search

Managing application access for Business Architects

Pega Email Bot configuration

  • Módulo

    Pega Email Bot configuration

    3 Temas

    45 minutos

    Pega Platform 8.8 Visible to: All users
  • Pega Email Bot™ leverages Pega’s industry-leading natural language processing (NLP) and process automation to interpret, route, audit, and automate...

Perpetual KYC with event-driven architecture

  • Módulo

    Perpetual KYC with event-driven architecture

    3 Temas

    35 minutos

    Pega Client Lifecycle Management for Financial Services 8.8 Visible to: All users
  • Customer data changes, ongoing e-screening alerts, and periodic review deadlines are just a few examples of types of events that the application might...

Presenting suggestions for agents

  • Módulo

    Presenting suggestions for agents

    4 Temas

    35 minutos

    Visible to: All users
  • During customer interactions, CSRs receive suggestions through notification cards in the Interaction Portal of Pega Customer Service™. They represent...

Securing and auditing data

Security Checklist awareness

  • Módulo

    Security Checklist awareness

    1 Tema

    20 minutos

    Platform Visible to: All users
    • What is the Security Checklist?
    • How do I access the Security Checklist?
    • How to use the Security Checklist?/What is the purpose?
    • What happens if I...

Tracking and auditing changes to data

Auditing changes to the value of fields

Configuring a coaching tip

Configuring a common phrase

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice