Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Daily CyberTech Highlights: Essential News and Analysis

July 30, 2025

Axonius Boosts Security Portfolio with $100M Cynerio Acquisition

July 30, 2025

Akamai SOTI Report Highlights Evolving Ransomware Tactic

July 30, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » Pega Launches Pega Cloud, Hosted by Google Cloud
Solutions & Tech

Pega Launches Pega Cloud, Hosted by Google Cloud

Staff WriterBy Staff WriterJuly 29, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Strategic deployment enables customers to leverage Pega’s industry leading capabilities while supporting data residency within the Kingdom’s borders.

Pegasystems Inc., the Enterprise Transformation Company, announced that Pega Cloud is now available as a service hosted on Google Cloud in the Kingdom of Saudi Arabia. This strategic deployment enables customers in the Kingdom to leverage Pega’s industry-leading capabilities while supporting data residency requirements within Saudi Arabia’s borders. This will directly support the government’s Vision 2030 initiative to establish the Kingdom as a regional technology hub.

The availability of Pega Cloud on Google Cloud in Saudi Arabia addresses the growing demand for cloud-based software solutions as part of the Kingdom’s ambitious digital transformation agenda. With the Saudi Arabian Information and Communications Technology (ICT) market valued at approximately $48 billion and growing at 15-16% compound annual growth rate, this expansion demonstrates Pega’s commitment to supporting the country’s technological advancement and economic diversification goals.

Cyber Technology Insights : Tonic Security Secures $7 Million to Transform Cyber Risk Reduction with AI-Powered Exposure Management

As an enterprise AI decisioning and workflow automation platform, Pega delivers business-transforming value by partnering with the world’s largest organisations to Build for Change®. The introduction of Pega Cloud on Google Cloud in Saudi Arabia extends this capability to local enterprises seeking to modernise their operations.

Key Benefits of Pega Cloud on Google Cloud:

Build and evolve mission-critical Pega applications with enterprise-grade cloud services that meet the most demanding security and performance requirements

Drive greater value from Pega solutions with up-to-date services and access to Pega’s latest capabilities, ensuring continuous innovation and competitive advantage

Deliver better business outcomes faster with centralized Pega operations management, reducing time to market and operational complexity

Innovate faster with Pega Agentic AI powering revolutionary design-time tools like Pega Blueprint, allowing for accelerated ideation to production timelines.

Cyber Technology Insights : CompassMSP and BlackPoint IT Join Forces to Establish a Nationwide IT and Cybersecurity Leader

The announcement aligns with Pega’s recognition as a leader in the Forrester Wave for AI Decisioning Platforms, where the company achieved a perfect score on strategy. This industry recognition underscores Pega’s position at the forefront of enterprise automation and AI-driven decision-making capabilities.

Pega Cloud on Google Cloud provides customers with a fully managed cloud service that reduces time to market, improves planning and cost efficiency, and delivers enterprise-grade security. The service includes 24/7 global and regional support, operational system monitoring, and fault-tolerant environments with multi-layer redundancy, ensuring that mission-critical applications remain available and high-performing.

The company’s extensive compliance certifications and adherence to international standards provide customers with confidence in their data security management.

Cyber Technology Insights : Root Evidence Secures $12.5 Million to Transform Vulnerability Management with Evidence-Based Security

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: businesswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCyber Alert: Hackers Deploy Linux Auto-Color Malware via SAP NetWeaver Flaw
Next Article Orange Unveils Major Cyberattack Alert
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Daily CyberTech Highlights: Essential News and Analysis

July 30, 2025

Akamai SOTI Report Highlights Evolving Ransomware Tactic

July 30, 2025

VDart Digital Appoints Mohamed Irfan Peeran as CEO

July 30, 2025
Leave A Reply Cancel Reply

Latest Posts

Axonius Boosts Security Portfolio with $100M Cynerio Acquisition

July 30, 20250 Views

FBI Uncovers $2.4M Bitcoin Haul from Chaos Ransomware

July 29, 20250 Views

National Guard Deployed in Response to St. Paul Cyberattack

July 29, 20250 Views

Aeroflot Grounds Flights Amid Cyberattack Chaos

July 29, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Daily CyberTech Highlights: Essential News and Analysis

July 30, 2025

Axonius Boosts Security Portfolio with $100M Cynerio Acquisition

July 30, 2025

Akamai SOTI Report Highlights Evolving Ransomware Tactic

July 30, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202515 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20257 Views

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.