Question

1
Replies
345
Views
HJetti Member since 2011 10 posts
Incessant Technologies
Posted: June 8, 2017
Last activity: June 9, 2017
Closed

Cyber Security

Hi Team,

We are using Pega 7.1.9, As part of security assessment across the products customer requested weather Pega supports following security monitoring? Can someone please advice if yes/no followed by a brief explanation

The level of monitoring performed includes all of the below?
1. Detection of malware;
2. Detection of injection attacks;
3. Detection of brute force attacks;
4. Detection of a denial of service attack;
5. Unauthorised access to sensitive resources;
6. Unauthorised termination of security processes; and
7. Events that exceed defined thresholds.

Thanks,
Hari Jetti

***Edited by moderator, Maryrita: moved to Product Support from Applications***

Security
Moderation Team has archived post
Share this page LinkedIn