Tools and knowledge to help you succeed.
Explore solutions, events, and customers
Register for our flagship virtual event
Discover program benefits and enablement resources
Extend Pega with components and apps
Manage your organization's relationship with Pega
Drive success with centralized content and resources
Find product guides and reference docs
Complete missions, earn badges, and stay current
Design Pattern Library
Explore common implementation patterns
Pega Cosmos Design System
Browse library of UI/UX templates, patterns, and components
Log in or sign up to set up user profile.
Log in or sign up to set up personalized notifications.
Looking for instructor-led training?
2 heures 35 mins
Learn how Pega Email Bot™ can act as a virtual assistant to your customer service representatives. Reduce time spent categorizing and routing inbound...
22 heures 35 mins
Continue learning about low-code application development using Pega Platform™.
5 heures 30 mins
Pega Digital Messaging delivers frictionless experiences over all the top consumer-preferred digital channels, including chat, Facebook, Twitter...
4 heures 25 mins
Learn how Pega Email Bot™ can assist in processing, routing, and automating emails to reduce the time it takes to manage overflowing inboxes. In this...
1h 38 mins
At its core, Pega App Factory is a lightweight framework which runs on the Pega Platform which enables repeatable low-code development success in App...
1h 10 mins
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Learn about Pega’s application development capability and how you can create applications using low-code tools like App Studio.
Learn how you can configure role-based access control by using the Access Manager. Access Manager secures your application and tightens the access...
Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.
1h 5 mins
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.