Module
Configuring security policies
Archived
4 Topics
40 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to thwart these attempts.
Module
Archived
4 Topics
40 mins
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to thwart these attempts.