Article
Mar 29, 2019

Pega ® Platform provides encryption of sensitive data while the data is at rest. For more information, see Encryption in Pega Platform . This encryption can be performed using a platform cipher or by using a custom cipher that you define. To implement a custom cipher, you create the cipher class,…

Article
Mar 25, 2019

Go to the Pega Predictive Diagnostic Cloud™ product page on Community .

Article
Mar 22, 2019

Pega Platform™ supports two-factor authentication by sending a one-time password (OTP) to a user through email. The user must enter this one-time password in your Pega Platform application for verification. Two-factor authentication is supported for the following use cases: In custom authentication…

Article
Mar 13, 2019

After you install Pega Marketing for Communications (PMC), you can set up a sample application. You can use the sample application to test rules and demonstrate features. Install and configure the PMC sample application by performing the following actions: Importing the sample application…

Article
Mar 6, 2019

The prconfig.xml   file and Dynamic System Settings include parameters that control access to the Pega Platform™ database. As a best practice, use the Dynamic System Settings rather than editing the prconfig.xml file. Edit the prconfig.xml file to overwrite Dynamic System Settings that apply to a…

Article
Feb 28, 2019

The System Summary landing page lists performance interaction statistics for your monitored system. Use the page to quickly view your system’s condition. In the Pega Predictive Diagnostic Cloud™ header, you can select the name of the monitored system. The System Summary is divided into the…

Article
Nov 13, 2018

Case Management processes in PegaRULES Process Commander (PRPC) contain tasks that need to be completed, however, the tasks and the order in which they are performed vary. Rather than being a linear, serialized process, a case is made up of many processes, tasks, policies, and supporting content.…

Article
Oct 17, 2018

Cross-Site Request Forgery (CSRF) is an attack that forces a user to execute unwanted actions on a web application in which the user is currently authenticated. CSRF specifically targets state-changing requests, not theft of data, because the attacker cannot see the response to the forged request.…

Article
Oct 17, 2018

As a best practice, configure these Dynamic System Settings to enable greater security in your application before moving your application from development to a production environment. To obtain the values to include in the cross-site request forgery (CSRF) mitigation lists, enable CSRF mitigation,…

Video
Oct 3, 2018

Mayran Snir Barak, Bence Magyar, and Mike Degatano discuss the latest features in Pega 8.1 for Data Management and Integration.