The Power of Employee Insights
As manufacturers increasingly rely on cloud-based platforms like Plex ERP to streamline operations, cybersecurity becomes a critical pillar of business continuity. With sensitive production data, customer information, and supply chain workflows housed in the cloud, protecting user access is no longer optional—it’s essential.
This article explores how Plex ERP aligns with cybersecurity best practices, including NIST 800-171 guidelines, and outlines actionable steps manufacturers can take to secure their cloud login environments.
Plex has implemented a robust identity and access management system that supports secure user authentication and flexible policy enforcement. Here are key highlights:
In alignment with NIST’s recommendations, Plex has eliminated mandatory password expiration. This change is based on research showing that frequent password resets often lead to insecure practices—such as predictable patterns or writing passwords on sticky notes.
Instead, Plex enforces:
A minimum password length of 10 characters
An entropy requirement equivalent to 108 guesses
No expiration policy, unless a compromise is suspected
This approach improves security while reducing user friction.
Plex supports IP address control to restrict access to specific applications or the entire system. This feature allows administrators to:
Limit access to trusted networks
Prevent unauthorized logins from unknown or risky locations
IP addresses are configured using the Valid IP Addresses application and applied through the Security Roles Manager or Security Manager.
For organizations with custom audit requirements, Plex recommends integrating third-party IdPs such as Azure AD or Okta. These platforms offer:
Custom password policies
Advanced multi-factor authentication (MFA)
Centralized identity brokering via IAM
This flexibility allows manufacturers to tailor their security posture to meet internal and external compliance standards.
Even with Plex’s built-in protections, user behavior plays a vital role in maintaining a secure environment. Here are essential best practices every manufacturer should adopt:
Avoid reusing passwords across systems. Encourage employees to use password managers to generate and store complex credentials securely.
Where possible, integrate MFA through third-party IdPs. This adds an extra layer of protection against credential theft.
Each user should have a unique login. Sharing credentials compromises accountability and increases the risk of unauthorized access.
Regularly audit login logs and access patterns. Look for anomalies such as logins from unfamiliar IP addresses or unusual times.
Use role-based access controls to ensure users only access the data and applications necessary for their job functions.
Cybersecurity awareness training should be a regular part of onboarding and ongoing development. Teach employees how to recognize phishing attempts, secure their credentials, and report suspicious activity.
Cybersecurity is a shared responsibility. Plex ERP provides a strong foundation with NIST-aligned password policies, IP address controls, and support for enterprise-grade identity providers. But it’s up to manufacturers to implement smart login practices and foster a culture of security across the organization.
By combining platform capabilities with proactive user management, manufacturers can confidently protect their operations in the cloud.