Centaur Connect Gateway is a secure connectivity solution that enables our cloud-based D4W Mobile application to access on-premise Dental4Windows databases without requiring complex firewall configurations or VPN setups. The gateway creates an encrypted connection between your practice’s database and Centaur Software’s cloud infrastructure, ensuring secure access to patient data.
The gateway operates using a secure connection architecture:
The gateway employs multiple layers of security:
No. The architecture prevents Centaur staff from accessing practice data:
Centaur Software staff can view connection metadata (who’s connected, when), but cannot access patient records or database contents.
Defence-in-depth design limits impact:
Additionally, Centaur’s cloud infrastructure follows industry security best practices, including network isolation, monitoring, and incident response.
Centaur Software maintains ongoing security vigilance:
Centaur Software takes security seriously:
Please contact Centaur Software support regarding our security vulnerability reporting process.
Centaur Connect Gateway is designed to support multiple compliance frameworks:
ISO 27001:2022: Information security management system standards
ISO 27001:2022 Annex A Controls
Australian Privacy Principles (APPs): Privacy requirements for handling personal information.
Australian Privacy Principles (APPs)
SOC 2: Service Organisation Control 2 for security, availability, and confidentiality.
SOC 2 Trust Services Criteria
Essential Eight: Australian Cyber Security Centre’s mitigation strategies.
Essential Eight Mitigation Strategies
Centaur Connect Gateway directly assists dental practices in meeting their Essential Eight obligations.
Direct Compliance Support
Indirect Compliance Support
Practice Benefits
By implementing Centaur Connect Gateway, practices can demonstrate compliance with Essential Eight Strategy 7 (Multi-Factor Authentication) and receive support for several other strategies, significantly simplifying their overall Essential Eight compliance posture.
Security Controls
Privacy Controls
Important Note: Full compliance requires not only secure technology but also proper policies, staff training, and operational procedures. Please consult with your compliance officer to ensure all requirements are met.
Centaur Connect Gateway implements multi-layered authentication.
Primary Authentication: Email address and strong password.
Multi-Factor Authentication (MFA): MFA is mandatory for all Centaur Connect Gateway accounts and uses the RFC 6238 TOTP standard with Time-based One-Time Passwords.
During registration, you receive a QR code to scan into your authenticator app, ensuring the secret key is never transmitted over email or insecure channels.
Account Activation: Administrative approval is required before accounts become active.
This defence-in-depth approach ensures that even if credentials are compromised, unauthorised access is prevented.
Our password security includes:
Passwords are never stored in plaintext and cannot be retrieved by anyone, including Centaur Software staff.
Comprehensive rate limiting prevents credential stuffing and brute force attacks:
These measures ensure that even if an attacker has partial credentials, systematic guessing is computationally infeasible.
All data transmission is encrypted using industry-leading protocols.
TLS 1.2 and TLS 1.3 Encryption: Modern Transport Layer Security protocols with AES 256-bit encryption (with 128-bit as minimum). Data flowing between your practice and the cloud is protected with the same encryption standards used by online banking.
Certificate Security and Validation: Centaur Connect Gateway implements rigorous certificate validation
Forward Secrecy: TLS 1.3 provides perfect forward secrecy, ensuring past communications remain secure even if future keys are compromised.
Man-in-the-Middle (MITM) Attack Protection: Through mandatory encryption, certificate validation, certificate chain trust, revocation checking, and enhanced security options, intercepting or modifying data in transit without detection is cryptographically infeasible.
Data storage follows security best practices:
Multiple layers of SQL injection defence:
The gateway implements replay attack protection using:
This ensures that attackers cannot replay intercepted authentication requests.
Session management features include:
These measures prevent unauthorised access to established sessions.
Comprehensive input validation prevents injection attacks and data corruption:
Multiple DoS mitigation strategies:
Network Configuration
Benefits over traditional VPN
Strict isolation mechanisms:
It is architecturally impossible for one practice to access another practice’s data.
Resilience features:
Secure registration workflow:
This multi-step process ensures only authorised personnel can create accounts.
System administrators can:
Administrative operations are performed with appropriate access control.
Email communication security:
Sensitive data (passwords, MFA secrets) is never transmitted via email.
Yes, password rotation is configurable:
Industry-recognised security standards:
Industry-recognised security standards:
Comprehensive logging infrastructure:
Logs provide forensic evidence for security investigations and compliance audits.
Software installed at the practice that creates a secure connection to the cloud gateway.
Time-based One-Time Password (RFC 6238), a type of multi-factor authentication using rotating 6-digit codes.
Transport Layer Security, the encryption protocol protecting data in transit (TLS 1.2 and TLS 1.3).
Advanced Encryption Standard, a symmetric encryption algorithm used for securing data.
Multi-Factor Authentication, requiring multiple forms of identity verification.
International standard for information security management systems.
Privacy requirements under the Australian Privacy Act 1988.
Service Organisation Control 2, an audit framework for security and privacy controls.
Australian Cyber Security Centre’s baseline mitigation strategies.
Trusted entity that issues digital certificates.
Request for Comments, technical standards for Internet protocols.
Process of encoding data so only authorised parties can access it.
Process of verifying the identity of a user or system.
A period of authenticated connectivity between systems.
For technical support with the Centaur Connect Gateway, contact us via: