electronic access control

From Legacy to Leading Edge: A visual journey through the evolution of security technology

From Legacy to Leading EdgeBy Gina Stuelke, CEO of Kenton Brothers

Back in 2008, our industry experienced a significant convergence event joining physical security and IP based networks onto a common platform. This was a major shift away from the disparate systems we had become accustomed to. That seems like such a long time ago! Today, we are involved in another convergence event involving physical security and cyber security.

The two pyramids in the images below represent the technology stacks used by Kenton Brothers, with each layer reflecting the progression of security technologies and how our offerings have elevated over time.

Kenton Brothers 2008 Technology Pyramid

Kenton Brothers Systems for Security: Pyramid1. Base Layer (Mechanical Locking Hardware): Traditional, physical locking systems.
2. High Security Cylinders and Masterkey System Implementation: The introduction of advanced physical keys and locks.
3. Legacy and Stand-Alone Access Control and Analog Video Surveillance Systems: Initial electronic security measures, such as standalone access systems, video surveillance and analog technologies.
4. Network-Based (IP) Access Control and Video Surveillance Systems: The shift to internet-based systems, improving remote access and integration.
5. Integration Services: Combining different systems (video, access control, etc.) for better coordination and ease of use.
6. Hosted and Managed Services: Outsourcing and cloud-based security management to external providers.
7. Video Analytics: Using software to analyze video data and identify suspicious activities automatically.

Kenton Brothers 2024 Technology Pyramid

Kenton Brothers Technology Pyramid1. Base Layer (Security Policies and Procedures): Security begins with robust organizational policies and procedures, a foundational aspect in modern security systems.
2. High Security Physical Hardware: Continues from previous physical security technologies but is more sophisticated.
3. Detection: Active detection systems for unauthorized access or incidents (includes sensors, alarms, etc.).
4. Access Control: Advances in access control technology (includes biometric and smart credentials).
5. Video Surveillance: Video monitoring remains central, but with higher resolution, better storage, and cloud integration.
6. Analytics and AI Support: Modern video surveillance includes AI, improving event detection and proactive analysis.
7. Cyber Hardening: Reflects the growing importance of cybersecurity, securing systems from hacking and digital threats.

What are the comparisons in technological advances?

  • Shift from Analog to IP: Over the last decade, analog systems (present in the first pyramid) have largely been replaced by IP-based systems, which allow for higher quality video and easier integration into larger networks.
  • Integration of AI and Analytics: Modern systems (second pyramid) emphasize the use of AI for proactive security management. This shift moves beyond video analytics to AI-supported threat detection, reducing human workload and improving accuracy.
  • Focus on Cybersecurity: The first pyramid lacks any mention of cybersecurity, which has become essential in modern security infrastructures due to the increasing threat of hacking. Cyber hardening in the second pyramid highlights this critical evolution.
  • Increased Use of Cloud Services: The second pyramid also reflects advances in cloud technologies for video storage, processing, and real-time analytics—leading to more flexible, scalable, and manageable systems.
  • Detection Technologies: Detection is more advanced in the second pyramid, likely including smarter sensors and automated systems integrated with AI.

Security systems have evolved from primarily physical and standalone solutions (first pyramid) to highly integrated, AI-driven, and cyber-secure ecosystems (second pyramid). These technological shifts have led to more automated, efficient, and intelligent systems capable of responding to modern-day security threats.

Has your commercial security stack been in place for a long time? It may be time to take a good look to make sure you are keeping up with the aggressive changes in technology. And if you need help, please give us a call!

Door Naming Conventions – Keeping Businesses Organized and Secure

By Neal Bellamy, IT Director at Kenton Brothers

Door Naming ConventionsOne of the most critical aspects of planning a commercial security system design for a facility is organization. Taking the time to get the details right ensures that all users of the system easily understand how the various components and functions will work together. One of the topics that can cause a lot of confusion is how to verbally reference a specific door inside your building(s).

Depending on the size and nature of your business, an organization can end up having to secure a lot of doors!

Part of the KB Advantage is that we take pride in creating custom solutions for our clients. And that’s not marketing speak… We actually enjoy the process of working with you to design customized commercial security systems that will protect your people, property and possessions. We also like partnering with you to maintain or update your existing commercial security systems. Knowing that employees feel safer, and security officers have more confidence in their system, puts a smile on our face.

Regardless of the size of your access control system, it’s a good rule of thumb to have a naming convention established for the various doors in your system. For smaller systems, this is as easy as naming a door Main Entry or Employee Door. But what about when we’re talking about a system that has 10, 20, or even 500 doors? This is where you will see the value of our 127 years of experience providing commercial security solutions to businesses nationally.

A Conversation with Vince

Door Naming ConventionsI sat down with one of our employees, Vince Gelei, to learn more about our best practices for door naming conventions. Vince is experienced in the process of building and programming the many access control systems we provide for our customers.

Sometimes, it’s hard to put into perspective the number of devices that are involved in the access control programming for a single door. Without having some structure, the system can become convoluted and hard for both the end user and integrator to operate and maintain. Vince provided some great insight on the key factors for developing such a framework within an access control system:

  • End User’s Security Capacity – Determining the technical level of our customers plays a big part in system design. (We can’t provide a solution that’s hard for our customers to understand and use.) We want to make sure the final naming conventions will be an intuitive reference for the end user. This is the first priority in system programming.
  • Access Control System – The commercial security system that the customer has chosen also plays a big part in how we set up naming conventions. The capabilities of their system dictate what we can and cannot do when setting up doors and their naming structure.
  • Territory or Location – We would want to set up a City Reference if you have a national presence. For a specific region all the way down to a single building, we would set up a Building Reference. (These terms are the first step in verbally referencing a specific door.)
  • Total Door Count of Site – When we know ahead of time how many doors are on site and how they function, we can document this in your access control system. (This is not a feature supported in all access control platforms. This is another reason why our system design process is critical.)
  • Site Floor Plans – With existing floor plans we can document the solution for quick reference.
  • Door Numbers – Do the facilities have pre-established door numbers? If your building already has door numbers, we would simply leverage that convention.
  • Potential for Growth – Is this just the first phase of implementing a commercial security solution for your organization? If so, we want to plan for future phases and the growth of your organization. Trying to develop this afterwards can be a nightmare!

Door Naming ConventionsVince also goes on to explain, “A door could be named doors, access points, portals, etc. in your existing system. We help our customers rename them in a way that end users operating the system will be able to quickly identify the physical location of any door. Of course, with larger sites there is more complexity. We work with the end user to create a site-specific nomenclature that is typically composed of literal door numbering, but also acronyms to codify and differentiate the different locations.”

The overall recommendation from Vince is that door naming is a small but important detail when planning out your security system.

At Kenton Brothers, we have the experience of working closely with our customers and partners to design and implement customized commercial security solutions. Whether it’s time for you to plan and build out your first solution or update your existing security systems, give us a call. We would love to help you.

Does your access control have a WOW factor?

By Neal Bellamy, IT Director at Kenton Brothers

Does your access control have a WOW factor?Access control is typically a Ho-Hum discussion. Who gets access to your doors? When during the day do they get access? Do you want pictures on your badges? What doesn’t get discussed often is how access control can make it easier to manage your facility. Ease of use is vastly different across access control platforms. Your decision on access control software can significantly affect how you manage your facility!

First, let’s start with site plans, or maps. 

Suppose you have someone that is watching your facilities, like a guard, SRO, or facility manager. In that case, a site plan can give you a visual representation of your facility and its security at a glance. For instance, in Gallagher, the site plan can show you if all the doors are open or closed, locked or unlocked, the last person who scanned through the door, whether it has been propped open or even forced open.

Does your access control have a WOW factor?If your Gallagher system is integrated with your camera system, the site plan will show you nearby cameras on the site plan. Likewise, if the intercom system is connected, the site plan allows you to talk to the person at the intercom, all through one interface.

Since Gallagher has a built-in intrusion system, showing the alarm status as well as arming and disarming can all be done through the site plan as well. Finally putting it all together, for facilities that are actively monitoring their system and you have an alarm where a door is forced open, or any other type of event, the alarm manager can show you on the map where the event is taking place, any cameras in the area, whether the alarm is armed and the last person who swiped through the door.

Although a common phrase at Kenton Brothers is that security and convenience don’t mix, mobile credentials are the exception.

Does your access control have a WOW factor?From a convenience perspective, mobile (or sometimes called Bluetooth) credentials can be issued easily through a web portal or software via text or email. Mobile credentials can be issued from hours and hundreds of miles away. From a security perspective, mobile credentials are already more secure than most physical cards. Usually, the cards have to be activated by the user, which makes cloning harder. In some instances, the credential is tied directly to the access control system and has a more unique identifier. Then on top of the already more secure credential, they normally can be combined for a multi-factor authentication like face id, fingerprint, or pin number.

Mobile credentials come in a couple of flavors, two independent systems for mobile credentials and access control, which is a little less convenient, and one combined, or integrated, system which is easier to use. Gallagher offers all of these convenience and security features. Furthermore, five mobile credentials come with every system so you can try it for yourself!

The next WOW! factor component is a mobile app to control your system from afar.

Does your access control have a WOW factor?Mobile apps are split fairly well among access control systems. Systems that have been around for decades are struggling to convert their very robust systems to also include a mobile app that has basic functionality. Newer systems that might have only been around for 5-8 years may only have a mobile app, but lack deeper access control features you might need. Gone are the days when our workforce comes in at 9 am, takes an hour’s lunch, and leaves the office at 5 pm.

People are working the hours that work for them, their family, and their business. This means visitors might come at all hours, people could get locked out while walking their dogs or stepping out for a late-night snack. A Mobile app gives authorized people the ability to allow approved staff into the office from anywhere with internet access. Good mobile apps also allow viewing and disabling cardholders as well as arming and disarming alarms.

Gallagher offers all of these features and even adds an evacuation process where you can account for everyone quickly, in case of an emergency. Just like mobile credentials, Gallagher includes one mobile app connection for each system.

Does your access control have a WOW factor? Does your access control have a WOW factor?

Gallagher is releasing new features constantly.

Does your access control have a WOW factor?There are some new features that we haven’t been able to use yet, but look great. The first is a VoIP/SIP server. Without getting too technical, most IP intercoms now are basically IP phones installed next to a door. Each have basic capabilities to call another IP phone. The Gallagher implementation offers the ability to answer intercoms, directly through the Gallagher app. While this won’t replace full integration of intercom systems, it will start to replace intercom integration where the end-user only needs a few intercoms.

The next new feature is a client web application, this new application allows users to connect with Gallagher over a web interface, rather than the full client or mobile app.

If you want to know more about how you and your company can take advantage of these WOW factors, give us a call!

Anti-Passback and Anti-Tailgating: Do you know who is in your building?

By Neal Bellamy, IT Director at Kenton Brothers

Do you know who is in your building? Do you know where everyone is located when they are in your building?

To help companies answer these questions, we use access control solutions. (As the name implies, these solutions control access to buildings.) When configuring these systems, we decide which people get into the building, which doors they can use and the times that they are able to open the door. Access cards are a key component of these systems.

Access Card Skimming Devices

Anti-Passback and Anti-TailgatingThere are reasons why you might want to increase security or safety by adding more features to your current access control system. Why? Copying and emulating an access card has become easier, due to new technology like a flipper zero and other skimming devices.

The best defense against copying a card is to use a card technology that has not yet been hacked. You also need to use encrypted communication between the reader and the control panel. (Both have been talked about before in my previous blogs). However, sometimes the upgrade path can take a long time to implement and/or be expensive depending on how large your system is and how old it is. Another way to guard against skimmers might be to ensure a card has only been used once to gain entry.

Anti-Passback

Anti-Passback and Anti-TailgatingAnti-passback is the access control term when we want to prevent someone from entering a door and then passing back the card to another person, who then uses the card to enter. Most access control systems have that technology available. When this feature is enabled, you also know when a person is leaving the area. If you know when they are in the area and you know when they leave an area, then you also know where they shouldn’t appear in the building. In other words, if the cardholder is already in the building, you should not grant access to the building again.

The reason an employee might try to get into the building again is because they loaned their card out, or because it was copied. Anti-Passback also provides more safety. If an emergency happens, you also know who was in the building or area at the time of the event. If you don’t have Anti-Passback enabled, you might know that a person came in that morning, but would not know that they left for lunch or an appointment during a specific timeframe.

To build on this example, imagine a multi-building company or a company located across multiple cities. If someone badged into the downtown campus and has not badged out, then they can’t possibly be at the uptown office. If they were in the New York office at 8am, there is no way they could be badging into the L.A. office at 9am.

Anti-Tailgating

You can also define areas within areas. You might have a building perimeter, then a lab inside, and maybe even a hazardous storage area inside the lab. You can set the rules so that they cannot enter the storage area unless they are in the lab first; You can’t enter the lab until they are in the building; and so on. (This technically is called Anti-Tailgating, but goes hand-in-hand with Anti-Passback.)

There are a few reasons you might want to know in real-time who is in your building. Anti-Passback and Anti-Tailgating can improve security by only allowing one person to be in one place, improve safety by knowing that someone was in the building during an emergency, and even help you understand where in the building someone is located.

We are experts at solving hard problems, if you have a unique situation, please let us help.

Commercial Security: Redundancy Servers and Why They Matter

By Ryan Kaullen, Field Services Manager at Kenton Brothers

Commercial Security: Redundancy Servers and Why They MatterRedundancy servers are put in place to keep things up and running in the event of a hardware failure. The engineering definition of redundancy is, “the inclusion of extra components which are not strictly necessary to functioning, in case of failure in other components.”

Redundancy servers can be put in place for access control systems and commercial video surveillance systems. There are also a couple of types of redundancy server options called “hot” and “cold”. In this blog, we will talk about these types and options and how they work to make your commercial security system more resilient.

Access Control Redundancy Server

Access control systems already have some redundancy built into them. The door controllers have on board memory, so they will continue to operate even if the main server fails. However, any changes that would need to be made to the card holders or door schedules in the event the main server fails can’t happen until the server is repaired. This is where a redundancy server for the access control system comes into play.  Depending on if you have a hot or cold redundancy server (we will discuss the differences later in this article) you will see either a shortened down time or almost no down time.

Commercial Video Surveillance System Redundancy Server

Commercial Security: Redundancy Servers and Why They MatterCommercial video surveillance systems rarely have server redundancy. If a server fails, the cameras will no longer be recording. Some management systems have capabilities for server failover built into the software. Unlike with an access control redundancy server where you have the hot or cold option, a video redundancy is likely going to be a hot redundancy server. If the initial server goes down, the redundancy server starts recording the video streams. Obviously, the big win in this scenario is that you mitigate the risk of lost video when you have a hardware failure at the worst possible time (when a security event is happening).

Hot and Cold Redundancy Server Options

A “Hot” redundancy server is one that runs in parallel with the main server. If the main server goes down, the redundancy server immediately picks up when the other one failed. This is usually a more expensive option as there can be more licenses, hardware, and integration needed so that it is running in parallel. The major pro here is that failover times are measured in milliseconds and after the initial set up requires no intervention from an IT team.

Commercial Security: Redundancy Servers and Why They MatterA “Cold” redundancy server is one that is set up and has the systems already installed, but is not running in parallel. While it is ready to be put into production if the main server fails, there is some setup that has to occur. At minimum, restoring services requires booting up the redundancy server. However, other requirements might include installing the latest backup of card holders, schedules, routing all devices to the new server, getting the IT team and daily operations team involved. While all of those things are happening, the primary server is down. No changes to the configuration can be applied across an access control system and no video streams are being recorded until the cold redundancy server is brought online.

Having back-ups in place for any commercial security system is critical. Redundancy servers play a huge role in making that a reality. Our security consultants will work with your organization to help you identify the right redundancy server option for your facility. If you would like to know more, please reach out to us today to start a discussion on how to provide redundancy for your systems.