Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

EU’s New Age Verification App Can Be Cracked in Just 2 Minutes, Experts Warn

April 17, 2026

US Nationals Sentenced for Aiding North Korea’s Tech Worker Scheme

April 16, 2026

Capita Faces Data Breach in Civil Service Pension System

April 16, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Pega Launches Pega Cloud, Hosted by Google Cloud
Uncategorized

Pega Launches Pega Cloud, Hosted by Google Cloud

Staff WriterBy Staff WriterJuly 29, 2025No Comments3 Mins Read7 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Strategic deployment enables customers to leverage Pega’s industry leading capabilities while supporting data residency within the Kingdom’s borders.

Pegasystems Inc., the Enterprise Transformation Company, announced that Pega Cloud is now available as a service hosted on Google Cloud in the Kingdom of Saudi Arabia. This strategic deployment enables customers in the Kingdom to leverage Pega’s industry-leading capabilities while supporting data residency requirements within Saudi Arabia’s borders. This will directly support the government’s Vision 2030 initiative to establish the Kingdom as a regional technology hub.

The availability of Pega Cloud on Google Cloud in Saudi Arabia addresses the growing demand for cloud-based software solutions as part of the Kingdom’s ambitious digital transformation agenda. With the Saudi Arabian Information and Communications Technology (ICT) market valued at approximately $48 billion and growing at 15-16% compound annual growth rate, this expansion demonstrates Pega’s commitment to supporting the country’s technological advancement and economic diversification goals.

Cyber Technology Insights : Tonic Security Secures $7 Million to Transform Cyber Risk Reduction with AI-Powered Exposure Management

As an enterprise AI decisioning and workflow automation platform, Pega delivers business-transforming value by partnering with the world’s largest organisations to Build for Change®. The introduction of Pega Cloud on Google Cloud in Saudi Arabia extends this capability to local enterprises seeking to modernise their operations.

Key Benefits of Pega Cloud on Google Cloud:

Build and evolve mission-critical Pega applications with enterprise-grade cloud services that meet the most demanding security and performance requirements

Drive greater value from Pega solutions with up-to-date services and access to Pega’s latest capabilities, ensuring continuous innovation and competitive advantage

Deliver better business outcomes faster with centralized Pega operations management, reducing time to market and operational complexity

Innovate faster with Pega Agentic AI powering revolutionary design-time tools like Pega Blueprint, allowing for accelerated ideation to production timelines.

Cyber Technology Insights : CompassMSP and BlackPoint IT Join Forces to Establish a Nationwide IT and Cybersecurity Leader

The announcement aligns with Pega’s recognition as a leader in the Forrester Wave for AI Decisioning Platforms, where the company achieved a perfect score on strategy. This industry recognition underscores Pega’s position at the forefront of enterprise automation and AI-driven decision-making capabilities.

Pega Cloud on Google Cloud provides customers with a fully managed cloud service that reduces time to market, improves planning and cost efficiency, and delivers enterprise-grade security. The service includes 24/7 global and regional support, operational system monitoring, and fault-tolerant environments with multi-layer redundancy, ensuring that mission-critical applications remain available and high-performing.

The company’s extensive compliance certifications and adherence to international standards provide customers with confidence in their data security management.

Cyber Technology Insights : Root Evidence Secures $12.5 Million to Transform Vulnerability Management with Evidence-Based Security

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: businesswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCyber Alert: Hackers Deploy Linux Auto-Color Malware via SAP NetWeaver Flaw
Next Article Orange Unveils Major Cyberattack Alert
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

April 15, 2026

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026
Leave A Reply Cancel Reply

Latest Posts

EU’s New Age Verification App Can Be Cracked in Just 2 Minutes, Experts Warn

April 17, 2026

US Nationals Sentenced for Aiding North Korea’s Tech Worker Scheme

April 16, 2026

Cryptocurrency Chaos: Breached Forums’ Wallet Addresses Revealed

April 16, 2026

Ransomware Ruler: The Payouts King Strikes Back

April 16, 2026
Don't Miss

Swedish Government Links Pro-Russian Group to Heating Plant Cyberattack

By Staff WriterApril 15, 2026

Top Highlights Sweden publicly links a pro-Russian group to a failed cyberattack on a heating…

Critical Flaws Fixed in April Patch Tuesday: Urgent Updates for SAP, Adobe, Microsoft, Fortinet & More

April 15, 2026

FBI & Indonesian Police Crush $20M W3LL Phishing Network

April 13, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • EU’s New Age Verification App Can Be Cracked in Just 2 Minutes, Experts Warn
  • US Nationals Sentenced for Aiding North Korea’s Tech Worker Scheme
  • Capita Faces Data Breach in Civil Service Pension System
  • North Korea Hacks macOS Users’ Data with ClickFix
  • Cryptocurrency Chaos: Breached Forums’ Wallet Addresses Revealed
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

EU’s New Age Verification App Can Be Cracked in Just 2 Minutes, Experts Warn

April 17, 2026

US Nationals Sentenced for Aiding North Korea’s Tech Worker Scheme

April 16, 2026

Capita Faces Data Breach in Civil Service Pension System

April 16, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Unlock the Power of Free WormGPT: Harnessing DeepSeek, Gemini, and Kimi-K2 AI Models

November 27, 202521 Views

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.