{"id":35986,"date":"2015-01-27T08:51:27","date_gmt":"2015-01-27T16:51:27","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=35986"},"modified":"2017-01-06T15:56:45","modified_gmt":"2017-01-06T23:56:45","slug":"3-hottest-physical-security-products-ces-2015","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/","title":{"rendered":"The 3 Hottest Physical Security Products at CES 2015"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/ces-hottest-security-products-2015\/\" rel=\"attachment wp-att-36115\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36115\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/ces-hottest-security-products-2015.png\" alt=\"CES 2015 with Apple and Security logos\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/ces-hottest-security-products-2015.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/ces-hottest-security-products-2015-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/ces-hottest-security-products-2015-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>You already know <a title=\"Intego.com (naturally!)\" href=\"https:\/\/www.intego.com\/\" target=\"_blank\">where to turn<\/a> for the best Mac security products on the planet. But as any good security practitioner will tell you, it&#8217;s important to take a layered approach to security.<\/p>\n<p>That&#8217;s why at my recent trek to the annual Consumer Electronics Show in Las Vegas, I zeroed in on physical security solutions that would be of particular interest to users of Apple products.<\/p>\n<p>Following is my list of top three hottest hardware security products at CES 2015.<\/p>\n<h3>Vysk QS1 Quantum Security Case for iPhone<br \/>\n<img loading=\"lazy\" class=\"alignright size-medium wp-image-35989\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Vysk-QS1-Black-Front-126x300.png\" alt=\"Vysk QS1 Quantum Security Case\" width=\"126\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Vysk-QS1-Black-Front-126x300.png 126w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Vysk-QS1-Black-Front-63x150.png 63w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Vysk-QS1-Black-Front.png 268w\" sizes=\"(max-width: 126px) 100vw, 126px\" \/><\/h3>\n<p>It seems almost as though some law of nature requires every tech convention that even remotely covers Apple products to have bazillions of booths dedicated to iPhone cases. CES is no exception.<\/p>\n<p>What stood out at Vysk&#8217;s booth was their <a title=\"Vysk QS1 Quantum Security Case for iPhone\" href=\"https:\/\/www.vysk.com\/quantum-security-case\" target=\"_blank\">QS1 Quantum Security Case<\/a>, which is now available for preorder (US $229.99 MSRP for the iPhone 5\/5s version; iPhone 6 version coming soon).<\/p>\n<p>The QS1 includes a physical camera shutter as well as a patented microphone jammer for the iPhone&#8217;s built-in mics. Designed to be the ultimate iPhone security case, it also comes with end-to-end phone call encryption software that transmits your calls over a secure data connection, rather than your carrier&#8217;s unprotected voice network (naturally, the person on the other end needs to be using the same software).<\/p>\n<p>There&#8217;s also encrypted text messaging software, as well as an encrypted photo gallery (with the idea being to prevent leakage of private photos, as <a title=\"Mystery Surrounds \u201ciCloud Hack\u201d as Naked Celebrity Photos Leak\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/\" target=\"_blank\">has happened to celebrities<\/a> in the past). The case also includes a built-in 2500mAh battery and a one-year warranty.<\/p>\n<h3>F\u016aZ Designs Noke (Bluetooth Padlock)<br \/>\n<img loading=\"lazy\" class=\"alignleft size-medium wp-image-35995\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Noke-quick-click-access-159x300.jpg\" alt=\"F\u016aZ Designs Noke\" width=\"159\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Noke-quick-click-access-159x300.jpg 159w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Noke-quick-click-access-79x150.jpg 79w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Noke-quick-click-access.jpg 280w\" sizes=\"(max-width: 159px) 100vw, 159px\" \/><\/h3>\n<p>&#8220;What could possibily be cool about a padlock?&#8221; you might ask. Quite a bit more than you think. With the <a title=\"F\u016aZ Designs Noke\" href=\"http:\/\/fuzdesigns.com\/pages\/Noke\" target=\"_blank\">Noke<\/a> (pronounced &#8220;no key&#8221;), which is now available for preorder (US $59.99 MSRP; to begin shipping in April 2015), there&#8217;s no need to remember to bring along a padlock key or spend time entering a combination when you&#8217;re in a hurry. As long as you&#8217;ve got your iPhone with you, just walk up to your lock and give it a tug and you&#8217;ll be on your way in no time, thanks to its clever use of Bluetooth pairing technology.<\/p>\n<p>As a backup in case your iPhone&#8217;s battery dies, just tap out a memorized combination (\u00e0 la Morse code) to unlock it. You can also grant someone else access to your Noke on a permanent, one-time, or custom basis via an app for iOS and Android.<\/p>\n<h3>EyeLock myris (Biometric Iris Scanner)<br \/>\n<img loading=\"lazy\" class=\"alignright size-medium wp-image-35998\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/myris-unique-unit-hand-222x300.png\" alt=\"EyeLock myris\" width=\"222\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/myris-unique-unit-hand-222x300.png 222w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/myris-unique-unit-hand-111x150.png 111w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/myris-unique-unit-hand.png 305w\" sizes=\"(max-width: 222px) 100vw, 222px\" \/><\/h3>\n<p>One of the most impressive physical security products at CES 2015 was EyeLock&#8217;s <a title=\"EyeLock myris\" href=\"http:\/\/www.eyelock.com\/index.php\/products\/myris\" target=\"_blank\">myris<\/a>, a biometric iris scanner USB dongle (US $279.99 MSRP; shipping now). With just a brief glance, you can have myris log you into your Mac. You can also use myris to log into Web sites; think of it as a portable, hardware-based alternative to password management software.<\/p>\n<p>Part of what makes myris so cool is its incredibly low false-accept rate. EyeLock says that Apple&#8217;s Touch\u00a0ID can be fooled about 1 in 50,000 tries, whereas myris&#8217; false accept rate is a miniscule 1 in 1.5 million attempts. In short, EyeLock claims that myris&#8217; biometric integrity is several orders of magnitude stronger than any biometrics based on voice, face, or fingerprint recognition.<\/p>\n<p><strong>Want more?<\/strong><br \/>\nThere was lots more to see at CES 2015. If you&#8217;re interested in what other consumer product gems you can expect to become available this year, be sure to read my featured article in an upcoming issue of MacTech Magazine (which will be available <a title=\"About MacTech Magazine\" href=\"http:\/\/www.mactech.com\/about\" target=\"_blank\">in print<\/a> and <a title=\"About MacTech Magazine on iPad\" href=\"http:\/\/www.mactech.com\/iPad\" target=\"_blank\">on iPad<\/a>). I&#8217;ll <a title=\"@theJoshMeister on Twitter\" href=\"https:\/\/twitter.com\/theJoshMeister\" target=\"_blank\">tweet<\/a> about additional bits of CES coverage, and I&#8217;ll keep a list of all my CES 2015 coverage <a title=\"the JoshMeister's CES 2015 Coverage\" href=\"http:\/\/blog.thejoshmeister.com\/2015\/01\/the-joshmeisters-ces-2015-coverage.html\" target=\"_blank\">here<\/a>.<\/p>\n<p>And, of course, if you&#8217;re not already subscribed to The Mac Security Blog, <a title=\"@IntegoSecurity on Twitter\" href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\">follow<\/a> and <a title=\"Like Intego on Facebook\" href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\">Like<\/a> us to keep abreast of Apple security news that matters.<\/p>\n<div>\n<hr>\n<div>\n<p>(Note: The\u00a0above products are\u00a0<strong>NOT<\/strong>\u00a0paid endorsements, and Intego and the author have no affiliation with these products or companies. This is just a straight-up, unbiased look at some products that caught the author&#8217;s eye at the show.)<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it&#8217;s important to take a layered approach to security. That&#8217;s why at my recent trek to the annual Consumer Electronics Show in Las Vegas, I zeroed in on physical security solutions [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":36121,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[1879,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it&#039;s important to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 3 Hottest Physical Security Products at CES 2015 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it&#039;s important to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-27T16:51:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:56:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png\",\"width\":400,\"height\":260,\"caption\":\"CES2015 logo Apple Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/\",\"name\":\"The 3 Hottest Physical Security Products at CES 2015 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#primaryimage\"},\"datePublished\":\"2015-01-27T16:51:27+00:00\",\"dateModified\":\"2017-01-06T23:56:45+00:00\",\"description\":\"You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it's important to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 3 Hottest Physical Security Products at CES 2015\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"The 3 Hottest Physical Security Products at CES 2015\",\"datePublished\":\"2015-01-27T16:51:27+00:00\",\"dateModified\":\"2017-01-06T23:56:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#webpage\"},\"wordCount\":669,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png\",\"keywords\":[\"CES 2015\",\"Security\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it's important to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/","og_locale":"en_US","og_type":"article","og_title":"The 3 Hottest Physical Security Products at CES 2015 - The Mac Security Blog","og_description":"You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it's important to","og_url":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2015-01-27T16:51:27+00:00","article_modified_time":"2017-01-06T23:56:45+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png","width":400,"height":260,"caption":"CES2015 logo Apple Security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/","name":"The 3 Hottest Physical Security Products at CES 2015 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#primaryimage"},"datePublished":"2015-01-27T16:51:27+00:00","dateModified":"2017-01-06T23:56:45+00:00","description":"You already know where to turn for the best Mac security products on the planet. But as any good security practitioner will tell you, it's important to","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The 3 Hottest Physical Security Products at CES 2015"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"The 3 Hottest Physical Security Products at CES 2015","datePublished":"2015-01-27T16:51:27+00:00","dateModified":"2017-01-06T23:56:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#webpage"},"wordCount":669,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png","keywords":["CES 2015","Security"],"articleSection":["Apple"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/3-hottest-physical-security-products-ces-2015\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/CES2015-AppleSecurity.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9mq","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35986"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=35986"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35986\/revisions"}],"predecessor-version":[{"id":61069,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35986\/revisions\/61069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/36121"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=35986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=35986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=35986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}