Pega Trust Center
Secure. Reliable. Compliant. Pega Cloud empowers the world’s biggest brands to meet – and exceed – the challenges of today and tomorrow. Learn how.Security
Our security policies provide a framework for safeguarding against unauthorized access and preventing/mitigating attacks that compromise performance and availability.
Authorization & access
Manage user and system data access with role-based controls to Pega Cloud Environment(s). Simplify native identity access management and integration with leading single sign-on technologies, including SAML, OAuth, and Active Directory.
Network protection
Our network architecture is designed to meet a range of security control requirements. Gain secure operation of your Pega Cloud Environment(s) isolated from fellow Pega clients and internal services thanks to our network rulesets and access controls.
Secure system integration
We offer multiple secure and private ways for Pega Cloud Environment(s) to integrate with systems in enterprise environments.
Client-based access control
Client-based access control rules define where and how customer data is stored and accessed. We associate personal data with actual people, not abstract entities such as businesses.
Data encryption
Encryption is critical to the protection of data whether it is in transit or at rest. Pega Cloud employs encryption across all Pega Cloud Environment(s) that meet or exceed client and regulatory requirements. When data is at rest, AES 256-bit encryption is the standard. For data in transit, Pega Cloud offers TLS 1.2 and TLS 1.3.
Privacy
Use our services to enable you to implement your own privacy and compliance strategies. We continually evolve our platform to provide the features and security measures that you may use to support your security and privacy strategy.
Read Pega's privacy noticeCompliance certifications, attestations, and accessibility
When evaluating the services listed under each compliance standard it should be noted that Pega relies on a common set of controls for the purposes of adherence. These common controls exist across the Pega Platform, the underlying infrastructure, and the operations, administration and management provided by Pega in Pega Cloud. Pega applications deployed within/on the Pega Platform inherit these controls which are attested to in the current scope
Pega Cloud certifications
In many cases Pega products have industry centric frameworks that will not be listed as a supported service but are considered included within the associated statement. For example, Pega Customer Service*, includes Pega Customer Service for Healthcare.
Laws and regulations
Pega's security, privacy controls and policies allow clients to address a broad range of laws and regulations. Below are some examples:
Accessibility
Read our accessibility statementService reliability
Whenever you need us, we’re there – 24/7, 365. Because reliability is the cornerstone of strong service.
Global service operation centers
From Cambridge, Massachusetts and Dulles, Virginia in the US to Sydney, Australia and Bangalore, India, the Pega Cloud global service operation center teams provide around-the-clock and follow the sun vulnerability and security management for environments and managed systems.
Complete system monitoring
We monitor for virtual infrastructure component issues and employ monitoring tools in order to get a full view of our network hosting environment. Plus, with Pega Access Manager, you gain a single view of your security model.
Risk & remediation
We handle risk and remediation by focusing on two areas of operational support: platform maintenance and incident response. Maintaining an updated platform is key to ensure all known vulnerabilities are patched. Our comprehensive approach to mitigation is designed to minimize the impact of any attempted attack.
"With more than 30 years of experience working with the world’s most respected brands, Pega understands the importance of security. This experience extends to Pega’s products and services that enable Pega to establish long-term partnerships with customers that are built on trust and transparency."