{"id":73873,"date":"2018-02-14T07:28:27","date_gmt":"2018-02-14T15:28:27","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=73873"},"modified":"2018-02-14T07:28:27","modified_gmt":"2018-02-14T15:28:27","slug":"apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/","title":{"rendered":"Apple&#8217;s New iMac Pro Delivers Enhanced Security with the T2 Chip"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-75631\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-T2-Security.png\" alt=\"Apple\u2019s New iMac Pro Delivers Enhanced Security with the T2 Chip\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-T2-Security.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-T2-Security-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-T2-Security-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Have you seen the new iMac Pro? What\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\u00a0AMD Radeon Vega graphics options, the iMac Pro\u00a0is a serious contender in the pro market. For those interested in Mac\u00a0security, what&#8217;s particularly noteworthy\u00a0in Apple&#8217;s new iMac Pro is a dedicated chip called the T2.<\/p>\n<p>In\u00a0Apple&#8217;s\u00a0<a href=\"https:\/\/www.apple.com\/in\/imac-pro\/\" target=\"_blank\">own words<\/a>,\u00a0the T2 does the following:<\/p>\n<blockquote><p>Introducing the Apple T2 chip, our second-generation custom Mac silicon. By redesigning and integrating several controllers found in other Mac systems \u2014 like the system management controller, image signal processor, audio controller, and SSD controller \u2014 T2 delivers new capabilities to the Mac. For instance, the T2 image signal processor works with the FaceTime HD camera to enable enhanced tone mapping, improved exposure control, and face detection\u2013based auto exposure and auto white balance. T2 also makes iMac Pro even more secure, thanks to a Secure Enclave coprocessor that provides the foundation for new encrypted storage and secure boot capabilities. The data on your SSD is encrypted using dedicated AES hardware with no effect on the SSD\u2019s performance, while keeping the Intel Xeon processor free for your compute tasks. And secure boot ensures that the lowest levels of software aren\u2019t tampered with and that only operating system software trusted by Apple loads at startup.<\/p><\/blockquote>\n<p>That all sounds pretty good! Encryption is handled by the T2, meaning\u00a0there is no impact on the CPU. For the end user, the presence of the T2 chip may\u00a0go unnoticed, but for those who\u00a0want to tweak the security settings, you can do so\u00a0through the new Startup Security Utility, found in Recovery.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-73879 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/StartupSecurityUtility.jpg\" alt=\"\" width=\"1000\" height=\"852\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/StartupSecurityUtility.jpg 1000w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/StartupSecurityUtility-150x128.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/StartupSecurityUtility-300x256.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/StartupSecurityUtility-768x654.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/StartupSecurityUtility-657x560.jpg 657w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p>The new T2 chip is a really cool feature that adds to the security of your Mac, but what about theft and safety protection for your Mac? Someone can still take your iMac Pro, or any Mac for that matter, and walk off with it. How do you secure the Mac itself?<\/p>\n<h3>Theft and safety protection for Mac<\/h3>\n<p>Over the years, Apple has removed from Macs the\u00a0one anti-theft\u00a0security feature it had\u00a0as everything now is\u00a0thinner, smaller and lighter. Known as the Kensington cable slot, it allowed you to secure your Mac to a desk or anything that would help make\u00a0stealing the Mac a lot harder. Here&#8217;s a MacBook Pro with that slot:<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-73885 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/kensingtonslot.jpg\" alt=\"\" width=\"824\" height=\"164\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/kensingtonslot.jpg 824w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/kensingtonslot-150x30.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/kensingtonslot-300x60.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/kensingtonslot-768x153.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/kensingtonslot-657x131.jpg 657w\" sizes=\"(max-width: 824px) 100vw, 824px\" \/><\/p>\n<p>Today the only Mac with that slot still available is the iMac. The Mac Pro, iMac Pro, MacBook, MacBook Air, MacBook Pro and Mac mini no longer have the slot,\u00a0so what can you do to secure these Macs in place? Let&#8217;s explore some options.<\/p>\n<h4><strong>iMac Pro<\/strong><\/h4>\n<p>With the Kensington slot gone, there are just two ways of securing a Mac\u00a0to a desk. You can run a Kensington cable through the hole in the back of the foot or you can secure it at the bottom of the foot. A cable through the hole in the foot is the easiest way, but over time it might scratch the foot \u2014 and depending on how the Mac is set up \u2014 look less than stellar.\u00a0Securing the foot in place might look better, but you lose the ability to move the Mac around on your desk.<\/p>\n<div id=\"attachment_73891\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73891\" loading=\"lazy\" class=\"size-medium wp-image-73891\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/imac_lock__1-300x203.jpg\" alt=\"\" width=\"300\" height=\"203\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/imac_lock__1-300x203.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/imac_lock__1-150x102.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/imac_lock__1-768x520.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/imac_lock__1-1024x693.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/imac_lock__1-657x445.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/imac_lock__1.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73891\" class=\"wp-caption-text\"><a href=\"https:\/\/www.maclocks.com\/mac-cable-locks\/mac-locks\/imac-lock-high-security.html\" target=\"_blank\">iMac Security Swivel Plate &#8211; maclocks.com<\/a><\/p><\/div>\n<p>Using something like the Security Swivel plate will make it a lot harder to steal the Mac, because it is\u00a0physically screwed into your desk.<\/p>\n<h4><strong>Mac Pro<\/strong><\/h4>\n<p>There are brackets available that attach to your Mac Pro, ranging from a simple Kensington slot clip to full base mount with cable management and the Kensington slot. Apple sells one, which you can <a href=\"https:\/\/www.apple.com\/shop\/product\/MF858AM\/A\/mac-pro-security-lock-adapter\" target=\"_blank\" rel=\"noopener\">see here<\/a>, but you may find it more preferable\u00a0to get some cable management out of such a solution, too.<\/p>\n<div id=\"attachment_73897\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73897\" loading=\"lazy\" class=\"size-medium wp-image-73897\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-300x300.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-768x768.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-1024x1024.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-657x657.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-32x32.jpg 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-50x50.jpg 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-64x64.jpg 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-96x96.jpg 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01-128x128.jpg 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Pro_Base_01.jpg 1500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73897\" class=\"wp-caption-text\"><a href=\"https:\/\/giros-design.com\/products\/probase-the-secure-mount-and-organizer-for-the-mac-pro\" target=\"_blank\">ProBase &#8211; giros design<\/a><\/p><\/div>\n<p>If your Mac Pro is in use as a server and\/or in an environment where a server rack is available, you may also want to consider mounting it in a rack.<\/p>\n<div id=\"attachment_73903\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73903\" loading=\"lazy\" class=\"size-medium wp-image-73903\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/rackmacpro_with_plate-300x179.png\" alt=\"\" width=\"300\" height=\"179\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/rackmacpro_with_plate-300x179.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/rackmacpro_with_plate-150x89.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/rackmacpro_with_plate.png 378w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73903\" class=\"wp-caption-text\"><a href=\"http:\/\/www.sonnettech.com\/product\/rackmacpro.html\" target=\"_blank\">RackMac Pro &#8211; Sonnet<\/a><\/p><\/div>\n<h4><strong>Mac mini<\/strong><\/h4>\n<p>As one of the more easy to steal Macs, locking this down is typically a good idea. Simple solutions are available that consist of enclosing your Mac mini in a bracket, which in turn is screwed to your desk or wall, or secured with a Kensington slot.<\/p>\n<div id=\"attachment_73909\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73909\" loading=\"lazy\" class=\"size-medium wp-image-73909\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac_mini_brackets-300x203.jpg\" alt=\"\" width=\"300\" height=\"203\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac_mini_brackets-300x203.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac_mini_brackets-150x102.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac_mini_brackets-768x520.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac_mini_brackets-1024x693.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac_mini_brackets-657x445.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mac_mini_brackets.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73909\" class=\"wp-caption-text\"><a href=\"https:\/\/www.maclocks.com\/mac-cable-locks\/mac-locks\/macmini-security-cable-lock.html\" target=\"_blank\">Mac Mini Mount &#8211; MacLocks<\/a><\/p><\/div>\n<p>The Mac mini is also a popular server; and, as such, it is often used in environments where a rack is available. If you are one of these users, securing your Mac\u00a0mini in a rack is a good\u00a0option.<\/p>\n<div id=\"attachment_73915\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73915\" loading=\"lazy\" class=\"size-medium wp-image-73915\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/hdr_rackmacmini-300x100.jpg\" alt=\"\" width=\"300\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/hdr_rackmacmini-300x100.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/hdr_rackmacmini-150x50.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/hdr_rackmacmini.jpg 603w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73915\" class=\"wp-caption-text\"><a href=\"http:\/\/www.sonnettech.com\/product\/rackmacmini.html\" target=\"_blank\">RackMac mini &#8211; Sonnet<\/a><\/p><\/div>\n<p>This\u00a0leaves us with the Macs most likely to be stolen \u2014 the MacBook series. Whether they sit on your desk or go with you everywhere, securing these laptops is not easy. You can&#8217;t bolt them to a desk, because that defeats the purpose of having a laptop.You can&#8217;t mount them in a rack, because it would be super uncomfortable to work on them. You can&#8217;t put a bracket on them, because the lid needs to open and close constantly&#8230; or can you?<\/p>\n<p>Luckily, when the Retina MacBook Pros came about, some clever people started looking for hardware lock solutions and now several are available.<\/p>\n<div id=\"attachment_73921\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73921\" loading=\"lazy\" class=\"size-medium wp-image-73921\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mbp_15_silver-0004_long_xa-300x115.jpg\" alt=\"\" width=\"300\" height=\"115\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mbp_15_silver-0004_long_xa-300x115.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mbp_15_silver-0004_long_xa-150x57.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mbp_15_silver-0004_long_xa-768x294.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mbp_15_silver-0004_long_xa-1024x392.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mbp_15_silver-0004_long_xa-657x251.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/mbp_15_silver-0004_long_xa.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73921\" class=\"wp-caption-text\"><a href=\"https:\/\/www.maclocks.com\/mac-cable-locks\/mac-locks\/the-ledge-new-macbook-pro-lock-macbook-pro-touch-bar-13-and-15-security-lock.html\" target=\"_blank\">Ledge Macbook Pro Touch Bar Lock Adapter &#8211; Maclocks<\/a><\/p><\/div>\n<div id=\"attachment_73927\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73927\" loading=\"lazy\" class=\"size-medium wp-image-73927\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/macbook_pro_retina_lock_bracket-300x233.jpg\" alt=\"\" width=\"300\" height=\"233\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/macbook_pro_retina_lock_bracket-300x233.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/macbook_pro_retina_lock_bracket-150x116.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/macbook_pro_retina_lock_bracket-768x595.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/macbook_pro_retina_lock_bracket-657x509.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/macbook_pro_retina_lock_bracket.jpg 836w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73927\" class=\"wp-caption-text\"><a href=\"https:\/\/www.maclocks.com\/mac-cable-locks\/mac-locks\/macbook-air-lock-bracket.html\" target=\"_blank\">Wedge MacBook Air Lock Bracket &#8211; Maclocks<\/a><\/p><\/div>\n<p>With the Apple laptops these days being so thin, there is nothing to physically connect an adapter or lock to, and so some manufacturers thought, &#8220;Hey! Why not screw the adapters into the Mac using the existing screw holes!&#8221; This is in fact a\u00a0great solution that will anchor the lock adapter firmly to your Mac, making it difficult to steal once secured to a desk or table.<\/p>\n<p>If you want some additional ports on your now almost port-less laptop, a dock might also be an attractive option.<\/p>\n<div id=\"attachment_73933\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-73933\" loading=\"lazy\" class=\"size-medium wp-image-73933\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Images_Connect-1DOCK1-300x183.png\" alt=\"\" width=\"300\" height=\"183\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Images_Connect-1DOCK1-300x183.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Images_Connect-1DOCK1-150x91.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Images_Connect-1DOCK1-768x468.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Images_Connect-1DOCK1-657x400.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Images_Connect-1DOCK1.png 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-73933\" class=\"wp-caption-text\"><a href=\"https:\/\/landingzone.net\/products\/macbook-docks\/for-the-macbook-pro\/dock\/\" target=\"_blank\">LandingZone DOCK &#8211; LandingZone<\/a><\/p><\/div>\n<p>While Apple continues to increase security on an internal hardware and software level, don&#8217;t forget to protect\u00a0the Mac itself. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/is-using-filevault-encryption-in-macos-good-enough\/\" target=\"_blank\">FileVault encryption<\/a> and the\u00a0cool, new Apple T2 chip may keep your data secure if your Mac is stolen, but it is\u00a0preferable to keep your data and your Mac safe and (obviously) in your possession. The above mentioned products are just a small sample of options available out there, so have a\u00a0look around online and you&#8217;ll find one that&#8217;s just right for you.<\/p>\n<p><em><strong>Have something to say about this story? Share your comments below!<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you seen the new iMac Pro? What\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\u00a0AMD Radeon Vega graphics options, the iMac Pro\u00a0is a serious contender in the pro market. For those interested in Mac\u00a0security, what&#8217;s particularly noteworthy\u00a0in Apple&#8217;s new iMac Pro is a dedicated chip called the [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":75643,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[3916,3910,3922,3919,3913],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Have you seen the new iMac Pro? What\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\u00a0AMD Radeon Vega graphics options, the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple&#039;s New iMac Pro Delivers Enhanced Security with the T2 Chip - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Have you seen the new iMac Pro? What\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\u00a0AMD Radeon Vega graphics options, the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-14T15:28:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png\",\"width\":400,\"height\":260,\"caption\":\"iMac Pro Hardware Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/\",\"name\":\"Apple's New iMac Pro Delivers Enhanced Security with the T2 Chip - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#primaryimage\"},\"datePublished\":\"2018-02-14T15:28:27+00:00\",\"dateModified\":\"2018-02-14T15:28:27+00:00\",\"description\":\"Have you seen the new iMac Pro? What\\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\\u00a0AMD Radeon Vega graphics options, the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple&#8217;s New iMac Pro Delivers Enhanced Security with the T2 Chip\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Apple&#8217;s New iMac Pro Delivers Enhanced Security with the T2 Chip\",\"datePublished\":\"2018-02-14T15:28:27+00:00\",\"dateModified\":\"2018-02-14T15:28:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#webpage\"},\"wordCount\":1140,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png\",\"keywords\":[\"Anti-Theft\",\"iMac Pro\",\"Mac mini\",\"Mac Pro\",\"T2 Chip\"],\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Have you seen the new iMac Pro? What\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\u00a0AMD Radeon Vega graphics options, the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/","og_locale":"en_US","og_type":"article","og_title":"Apple's New iMac Pro Delivers Enhanced Security with the T2 Chip - The Mac Security Blog","og_description":"Have you seen the new iMac Pro? What\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\u00a0AMD Radeon Vega graphics options, the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-02-14T15:28:27+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png","width":400,"height":260,"caption":"iMac Pro Hardware Security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/","name":"Apple's New iMac Pro Delivers Enhanced Security with the T2 Chip - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#primaryimage"},"datePublished":"2018-02-14T15:28:27+00:00","dateModified":"2018-02-14T15:28:27+00:00","description":"Have you seen the new iMac Pro? What\u00a0a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick\u00a0AMD Radeon Vega graphics options, the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple&#8217;s New iMac Pro Delivers Enhanced Security with the T2 Chip"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Apple&#8217;s New iMac Pro Delivers Enhanced Security with the T2 Chip","datePublished":"2018-02-14T15:28:27+00:00","dateModified":"2018-02-14T15:28:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#webpage"},"wordCount":1140,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png","keywords":["Anti-Theft","iMac Pro","Mac mini","Mac Pro","T2 Chip"],"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iMac-Pro-Hardware-Security.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jdv","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73873"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=73873"}],"version-history":[{"count":51,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73873\/revisions"}],"predecessor-version":[{"id":75535,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/73873\/revisions\/75535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/75643"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=73873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=73873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=73873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}