Strengthening our security model

As of 1 April (software version 4.5.141.0), we will introduce an enhanced security model within our platform.

Digital security is no longer a secondary concern but a fundamental requirement. Organisations are increasingly facing cyber incidents where system access is the starting point of larger problems. In many cases, such incidents do not arise from complex hacks, but from insufficiently protected access controls.

With the renewed security model, we structurally reduce this risk.

Why this step?

The digital world is changing rapidly, and organisations are increasingly confronted with cyber incidents. Notably, these incidents do not always result from advanced hacking techniques. Often, they start with something seemingly small: access to a system.

An open session, unlimited login attempts, or a weak password can already be enough to gain unauthorised access to sensitive data.

As a software provider, we believe these types of risks should not exist unnecessarily. Therefore, we are strengthening our access security and structurally eliminating potential vulnerabilities. By applying multiple layers of security, we ensure that system access is better protected and data remains secure.

With this step, we are actively investing in a safer digital environment for our customers.

Illustration of a user protected by multiple layers of security, such as MFA, password protection, a session timer and account security.

What will change in practice?

1. Security profiles (Low, Medium, High)

From now on, we will work with clearly defined security profiles: Low, Medium and High. Security settings are centrally defined for each profile. This includes settings such as:

  • Required password complexity
  • Maximum session duration
  • Use of multi-factor authentication (MFA)

This allows the security level to be aligned with the role and responsibilities of a user. The Medium profile will serve as the default setting. For accounts with elevated privileges, for example, the High profile can be applied. The security profile is configured at the user role level.


Settings High Medium Low
Use of multi-factor authentication (MFA) Yes No No
Number of failed login attempts3 3 3
Lockout duration (minutes) Increasing Increasing Increasing
User blocked after inactivity (days) 90 548 548
Session duration (minutes) 20 20 20
Password history retained 12 4 No
Password expiry (days) 60 No No
Minimum password length 12 8 6
Numbers required Yes Yes Yes
Special characters required Yes Yes Yes
Uppercase letters required Yes Yes Yes
Lowercase letters required Yes Yes Yes
Minimum number of unique characters 6 4 4

2. Automatic session termination

Sessions are automatically terminated after 20 minutes of inactivity.

This prevents unattended workstations from retaining access to sensitive information. Active users are not interrupted; only when no activity occurs for 20 minutes will the session be closed automatically. This reduces the risk of unauthorised access through unattended screens.

In the apps, this works slightly differently. Users are not logged out immediately when the session time expires. Instead, they are asked to log in again once a month, or earlier if the app has not been used for two weeks.

3. Temporary lockout after multiple failed login attempts

When an incorrect password is entered several times in a row, the account will be temporarily locked.

This measure protects against automated login attacks (brute-force attacks), where passwords can otherwise be guessed repeatedly. By limiting the number of attempts, we reduce the likelihood that unauthorised users can gain access to an account.

4. Strengthened password policy

Password requirements can now be configured per security profile. This makes it possible to enforce stronger passwords for accounts with higher privileges.

In addition, passwords can be set to expire after a certain period, after which users must create a new password that complies with the rules of the assigned profile.

The table below illustrates approximately how long it can take to crack a password using modern software in a brute-force attack. The longer and more complex the password, the more difficult it becomes to crack.

Password type Example Estimated time to crack
6 digits 483920 Instant (< 1 second)
8 lowercase letters welcomea A few minutes
8 letters + numbers welc0me2 A few hours
10 letters + numbers team2026ab A few weeks
10 characters with uppercase, numbers, symbols T3@m!2026x Several years
12+ complex characters K9$hT2!qLp@7 Thousands of years

5. Support for multi-factor authentication (MFA)

Multi-factor authentication (MFA) adds an extra layer of security in addition to the password. This means that knowing a password alone is no longer sufficient to gain access to an account.

Within the High profile, MFA is mandatory by default. In other profiles, MFA can be enabled if required.

When MFA is configured, this verification is also required when changing a password. This means that a user must first verify their identity using MFA before a new password can be set. This prevents unauthorised users from gaining access to an account through a password reset.

Frequently Asked Questions

Not every user has the same permissions or responsibilities. By using security profiles, the level of security can be aligned with the type of account. As a result, accounts with extended privileges can be assigned additional security measures, such as stricter password requirements or mandatory MFA.

Within the High security profile, MFA is mandatory by default. In other profiles, MFA can be enabled by the administrator.

MFA adds an additional layer of security and is strongly recommended, especially for accounts with extended privileges.

When an incorrect password is entered several times in a row, the account will be temporarily locked. This prevents passwords from being guessed indefinitely through automated attacks (brute-force attacks).

 

The lockout duration increases step by step if multiple failed login attempts occur within a 30-minute period.

Failed login attemptsActionLockout duration
1–3No lockout
4Temporary lockout1 min.
5Temporary lockout5 min.
6Temporary lockout15 min.
7Temporary lockout30 min.
8–9Temporary lockout60 min.
10 or moreUnlock only via email reset

After the lockout period, the user can attempt to log in again. If an account is blocked after 10 or more failed attempts, it can only be unlocked by performing a password reset via email.

In the app, this works slightly differently. You are not logged out immediately when the session time expires. Instead, you will be asked to log in again once a month, or earlier if the app has not been used for two weeks.

The security level is determined by the security profile (Low, Medium or High) that is linked to a user role. An administrator can adjust this by applying the desired security profile to the relevant user role.

Yes. When organisations use Single Sign-On (SSO), users log in through their own organisational account. Password management and access policies are then managed centrally within the organisation. This often provides additional convenience for users and makes it easier for organisations to manage access control and security policies centrally. For this reason, we recommend using SSO wherever possible.

Our entry-level configuration offers extensive capabilities and provides a complete package to deliver a solution for every diverse industry.

Centix offers three mobile apps that enable you to carry out all your tasks anytime and anywhere, including when you’re offline.

Connect your own systems and automate data flows through our open API solution.

To cater to every industry and specific situation, the Centix Online Basis configuration can be extended with additional modules.

With the standardised partner plug-ins, it is possible to seamlessly integrate Centix with other applications, such as ERP, HR, and financial systems.

Unlimited logins for all users; you only pay for users with modify rights who need to be logged in simultaneously.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.

Discover the impact of Centix in practice through the experiences of our valued customers from various industries.

Browse our downloads and discover what Centix Online can do for your organisation. This will give you a clear and immediate understanding of how we can support you optimally.

Read our blogs for up-to-date insights, practical tips, and best practices in asset management, all written by our experts.

Discover in our videos how Centix Online works in practice, from inspiring customer stories to clear instructional videos.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.

For over 25 years, Centix has been developing asset management software. With our SaaS solution, we help organisations worldwide efficiently manage their assets.

Become part of our innovative team. Explore our current vacancies and find your new challenge at Centix.

Do you have any questions or would you like to know more about our software? Please feel free to contact us! We are available on weekdays from 08:30 to 17:00.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.

Our entry-level configuration offers extensive capabilities and provides a complete package to deliver a solution for every diverse industry.

Centix offers three mobile apps that enable you to carry out all your tasks anytime and anywhere, including when you’re offline.

Connect your own systems and automate data flows through our open API solution.

To cater to every industry and specific situation, the Centix Online Basis configuration can be extended with additional modules.

With the standardised partner plug-ins, it is possible to seamlessly integrate Centix with other applications, such as ERP, HR, and financial systems.

Unlimited logins for all users; you only pay for users with modify rights who need to be logged in simultaneously.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.

Discover the impact of Centix in practice through the experiences of our valued customers from various industries.

Browse our downloads and discover what Centix Online can do for your organisation. This will give you a clear and immediate understanding of how we can support you optimally.

Read our blogs for up-to-date insights, practical tips, and best practices in asset management, all written by our experts.

Discover in our videos how Centix Online works in practice, from inspiring customer stories to clear instructional videos.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.

For over 25 years, Centix has been developing asset management software. With our SaaS solution, we help organisations worldwide efficiently manage their assets.

Become part of our innovative team. Explore our current vacancies and find your new challenge at Centix.

Do you have any questions or would you like to know more about our software? Please feel free to contact us! We are available on weekdays from 08:30 to 17:00.

Experience Centix Online

See for yourself how Centix Online can strengthen your organisation. Schedule a non-binding demonstration via Teams and discover the possibilities we offer.