Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Security of the working environment

Updated on March 4, 2022
Pega Smart Investigate for Payments Implementation Guide

Your application is preconfigured with usable security models that you can further customize to support your organization. The following sections describe some of the mechanisms through which your application and the underlying Pega 8 architecture provide a secure working environment.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us