The data breaches the majority of companies suffered from in the past years came from unsecured wireless devices like printers, scanners, mobile phones or laptops connected to their Wi-Fi network since cyber-attacks aim at these devices as the weakest points to get 'way in' to a business network.
In order to counter network infiltration, companies should make sure that the wireless devices they use pass at least vulnerability tests for WPA2 or WPA3. What’s more, it’s highly suggested to employ Common Criteria for Information Technology Security Evaluation (CC) to provide extra protection to these wireless devices.
CC refers to the Evaluation Assurance Level (EAL), which has seven levels graded from EAL1 to EAL7. Financial services generally use EAL6 augmented (or EAL6+) security compliance in their payment systems to justify the additional costs spent when handling high value protected assets that are transmitted in high risk situations.
Model | WDC10 / WDC10C |
WDC20 / WDC20C | WDC30 |
---|---|---|---|
Model Meeting Type | WDC10 / WDC10C Huddle Room Meeting | Middle-Size Room for B.Y.O.D meeting | Large-Size Room for confidentiality-sensitive meeting |
Model WiFi Standard | WDC10 / WDC10C WiFi 5 | WiFi 5 | WiFi 6 |
Model Distance | WDC10 / WDC10C 8m | 15m | 30m |
Model Output Resolution | WDC10 / WDC10C 1080p@60fps | 4K@30fps | 4K@60fps |
Model B.Y.O.D | WDC10 / WDC10C N/A | Airplay/ Google Cast/ BenQ InstaShare App | Airplay/ Google Cast/ BenQ InstaShare App |
Model Max Connection | WDC10 / WDC10C 16 | 32 | 64 |
Model Button Interface | WDC10 / WDC10C HDMI+USB Power or USB Type C | HDMI+USB Power or USB Type C | HDMI+USB Power |
Model WiFi Encryption | WDC10 / WDC10C WPA2 | WPA2 | WPA3 |
Model WiFi Security Certificate | WDC10 / WDC10C N/A | N/A | · CC EAL6+ (ISO/IEC 15408) · FIPS 140-4 |
Model Others | WDC10 / WDC10C N/A | HID Touchback Support | · HID Touchback Support · Certified Germ Resistance |
BenQ Lauded for its Commitment to Information Security with ISO27001 Certification. InstaShow Presentation Solution Perfectly Exemplifies the Company’s Rigorous Information Security Standards.