How Pega Unlocks Open-Source Potential with NetApp?

Sep 10, 2025
Interview
How Pega Unlocks Open-Source Potential with NetApp?

I’m thrilled to sit down with Vernon Yai, a renowned expert in data protection and privacy governance. With a career dedicated to pioneering risk management strategies and cutting-edge detection and prevention techniques, Vernon has become a trusted voice in safeguarding sensitive information. Today, we’re diving into his insights on data infrastructure challenges and innovative partnerships, inspired by a case study on Pegasystems’ collaboration with a managed data platform. Our conversation explores the complexities of integrating open-source technologies, the strategic shift to externalized services, and the critical factors in choosing the right operational ally. Let’s get started.

How do platforms like Pega Infinity leverage open-source tools to drive their functionality, and what makes this approach so essential?

Platforms like Pega Infinity are built to handle complex tasks such as workflow automation, customer engagement, and AI-driven decisioning. To do this effectively, they rely heavily on a variety of open-source tools like Apache Cassandra for data management or Kafka for real-time processing. These tools are essential because they offer flexibility, scalability, and a vibrant community for support and innovation. By using open-source, such platforms can adapt quickly to new needs without being locked into proprietary systems, ultimately delivering more tailored solutions to clients.

What are some of the biggest hurdles companies face when embedding multiple services directly into a single platform?

One major hurdle is scalability. When everything is embedded, scaling a single service often means scaling the entire platform, which is inefficient and resource-intensive. Additionally, managing diverse open-source components internally puts a heavy burden on teams. They end up spending more time troubleshooting or updating these technologies rather than focusing on core business objectives. It’s a classic case of getting bogged down in technical minutiae at the expense of strategic progress.

Why might a company decide to move away from an embedded model to independent services, and what benefits does this shift bring?

The primary driver is efficiency. An embedded model ties up resources and limits flexibility, so breaking services into independent components allows for targeted scaling and easier management. This shift frees up internal teams to focus on innovation and business goals rather than getting stuck in operational weeds. It also paves the way for leveraging external expertise, which can handle the heavy lifting of infrastructure management while maintaining alignment with the company’s vision.

When seeking a partner to manage externalized services, what key factors should a company prioritize?

A company should look for a partner that supports multi-cloud environments, like AWS and Google Cloud, to ensure flexibility and future-proofing. Security is non-negotiable—partners must align with strict guidelines to protect sensitive data. Operational compatibility is also crucial; the partner’s style and processes should mesh well with the company’s culture and deployment needs. Ultimately, it’s about finding a balance between trust, technical capability, and strategic alignment.

What qualities make a managed data infrastructure partner truly stand out in terms of visibility and control?

A standout partner offers transparency—nothing should feel like a black box. They deploy services in accounts that the company owns and can access fully, ensuring complete visibility into operations. This level of control is vital for maintaining oversight and making informed decisions. Unlike other providers that might obscure their processes, a great partner acts as an extension of the company’s team, fostering trust through openness and accountability.

Can you walk us through the process of upgrading or provisioning new services when working with a managed platform partner?

Typically, for something like upgrading to a new version of a database tool, the company would notify the partner of the desired change. The partner then handles the backend work—testing, deployment, and validation—before confirming the service is ready. For provisioning, it often involves an API request to spin up new resources, like a database cluster for a client. This streamlined approach, where the partner manages the heavy lifting within accounts the company controls, saves time and reduces complexity.

What are some common early challenges in collaborating with a managed service partner, particularly around infrastructure changes?

One frequent issue is the approval process for changes like scaling clusters to address performance issues. Initially, there might be a back-and-forth that delays action, potentially impacting client environments negatively. Over time, companies often work with partners to define clear scenarios where the partner can act independently, balancing speed with cost considerations. It’s about building trust and setting boundaries to ensure responsiveness without sacrificing oversight.

What advice do you have for our readers who are navigating similar data infrastructure partnerships or transitions?

My biggest piece of advice is to automate as much as you can, as early as you can. From testing and provisioning to monitoring and upgrades, automation saves countless hours and reduces human error. It’s an investment that pays off not just today but also as systems grow more complex. Also, prioritize partnerships that align with your long-term goals—don’t just solve for the immediate problem. Build relationships based on transparency and shared vision to ensure sustainable success.

Trending

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later