electronic access control

Common Commercial Security Server Issues

By Neal Bellamy, IT Director at Kenton Brothers

Common Commercial Security Server IssuesAlthough cloud-based systems are getting more popular, many security systems still have on-premise servers at their heart. Servers, like all electronics, can fail and will need to be replaced. Servers also need updating in many ways. Sometimes they can show signs of issues overnight, and sometimes more slowly over time. The overnight issues are easier to detect, but the slower failures can be harder to detect, so I thought I would share some things to look out for.

Video servers tend to be the most sensitive to component failure or being overloaded.

Video servers have the toughest job of all the security servers. They need to be able to connect to the cameras, pull the video stream off the network, process the video, and then possibly write it to a hard drive in near real-time. If any one of those processes struggles, the video may not be saved properly. At the same time, if cameras are being viewed, they need to be able to send the video to whoever is viewing them.

A sign that your video server needs help is when your video is “Jumpy”. Jumpy video is when the video appears to be choppy and does not play smoothly. Most video systems are recording at least 12 frames per second, so live and recorded video should appear to be smooth. It might not be as smooth as a movie or video game, but it should not have a very detectable jump between frames. Jumpiness is usually caused by an overwhelmed server, or some component, like a hard drive, has failed.

Another common issue is when logging into the security software becomes slower than usual. “Usual” depends on which software is being used, but it should be as fast as the day it was installed. Servers that turn themselves off or reboot themselves often, more than once a month, are also signs that they need help. If you sometimes can’t log in, but then can after waiting a while, the server might have just rebooted.

Sometimes it’s not because of a failure that your server needs attention, sometimes it’s just time.

Common Commercial Security Server IssuesServer software, like all software, can have security or feature updates. Server software like Windows, Linux, MAC OS, etc., needs to be maintained to have the latest features and security patches. Depending on the settings, security patches will download and install themselves, but if you’re not sure, you should check with your IT team.

All server software at some point will become obsolete and no longer be supported. At that point, you should at least have someone update your server to the latest version possible, or maybe even replace the server altogether.

There are some important Microsoft Windows end-of-support dates coming up this year. Windows 10, which has been around since 2015 will no longer be supported or have security patches being released as of October 14th, this year. Windows Server 2019 mainstream support already ended last year, it will not receive any feature updates, but will still receive security updates until January 2029.

Finally, it is worth mentioning since we are talking about servers failing… It is critically important to make sure your IT team is properly handling backups for your servers. Many companies get into a rut of seeing “backup completed” every day after the nightly backup, but then never checking if those backups can actually be restored. Talk to your IT team about the last time they tried to restore an important server from backups. The answer may shock you. Because the answer might be “never.”

If you are experiencing any of these issues or would like Kenton Brothers to come investigate the health of your server, please give us a call.

Specialized product alert: ‘Federation™’ of access control licenses

By Gina Stuelke, CEO of Kenton Brothers

Specialized product alert: ‘Federation™’ of access control licensesFor those of you using Genetec™ access control systems… did you know that Genetec offers Federation™? Federated licensing in Genetec’s security solutions provides organizations with a flexible, efficient, and scalable way to manage and optimize their security licenses across multiple locations or systems, ultimately improving resource allocation and reducing operational costs.

Federation™ joins multiple, independent Genetec™ security systems into a single virtual system. With this feature, users on a central system, called the Federation host, can view and control entities that belong to remote systems.

Let’s look at an example scenario:

Imagine a large retail company with stores in different cities. Instead of buying separate licenses for each store, they can pool their licenses into a federated licensing system. During a busy season, the licenses can be dynamically allocated to stores with higher demand (e.g., larger stores, stores with more foot traffic), while during quieter periods, the unused licenses can be reassigned or saved for future use, thereby maximizing efficiency and minimizing excess costs.

Benefits

  • Cost Efficiency: No need to over-purchase licenses for every installation.
  • Flexibility: Easily allocate licenses based on real-time needs across different sites.
  • Scalability: As the business grows, federated licensing allows for easy integration of additional systems without significant changes to infrastructure.
  • Centralized Management: Simplifies administration and tracking of licenses across multiple locations.

Federation within the scope of Genetec’s security solutions refers to a system in which multiple, geographically distributed installations of Genetec products (such as Security Center, Omnicast for video surveillance, AutoVu for automatic license plate recognition, and Synergis for access control) share and manage licenses across different locations, but in a unified and centralized manner.

Federated licensing

Key Concepts of Federation™

  1. Centralized Management: Federated licensing allows administrators to manage and allocate licenses from a centralized location. This means that licenses do not need to be tied to a specific server or installation. Instead, they are stored and managed in a federated pool that can be accessed by different systems across various sites.
  2. License Pooling: Organizations that have multiple installations of Genetec solutions at different locations can pool licenses together. This gives flexibility in distributing and reallocating licenses based on real-time needs, making it easier to optimize the use of available licenses across the network of installations.
  3. Efficiency and Cost Savings: Instead of purchasing separate licenses for each individual location, federated licensing allows for a more efficient use of licenses. For example, if a particular location isn’t using all its licenses, they can be allocated to another site in need, leading to cost savings and better utilization of resources.
  4. Scalability: Federated licensing supports scalability. As an organization expands or needs to add more cameras, devices, or systems, additional licenses can be integrated into the federated pool without the need to modify individual systems or installations.
  5. Cross-Site License Sharing: Organizations with multiple sites or regions can benefit from sharing licenses between them, making it easier to scale the system and meet fluctuating demands across various locations.
  6. Simplified Compliance: With federated licensing, organizations can also ensure compliance with licensing agreements without manually tracking licenses for each installation. Genetec’s system can track the overall license usage, making compliance easier to manage and reducing the risk of under- or over-licensing.
  7. Cloud-Enabled: In some cases, federated licensing can also be integrated with cloud-based systems. This enhances the flexibility of license allocation and management, especially when dealing with installations spread across wide geographical areas or multiple time zones.

Kenton Brothers is happy to assist you in advancing your uses of your access control systems. Let us know how we can help!

Let’s discuss ‘Anti-passback’: What is it and what can it do for you?

By Gina Stuelke, CEO of Kenton Brothers

Advantages of Anti-Passback in Access ControlIn our continuing series of educational posts, we love sharing the layered capabilities of access control systems.

Anti-passback is a security feature in an access control system that prevents a user from passing their access credential (like a key card or mobile badge) to another person for unauthorized entry. It requires users to “exit” before they can “re-enter” and enforces a logical sequence of “in” and “out” events to prevent fraudulent or unauthorized use of credentials.

Capabilities

Prevents Credential Sharing

  • Purpose: Ensures that access cards or credentials aren’t passed between individuals to bypass security.
  • Benefit: Stops unauthorized access by enforcing that a badge used to enter must also be used to exit before it can be used again

Enhances Occupancy Tracking

  • Purpose: Keeps accurate logs of who is inside the building or specific areas.
  • Benefit: Useful for emergency evacuations, audits, or real-time occupancy monitoring (e.g., for energy efficiency or space planning).

Supports Compliance and Safety Protocols

  • Purpose: Helps meet regulatory or internal policies related to controlled access.
  • Benefit: Assists with compliance in industries requiring strict access monitoring (e.g., data centers, pharmaceuticals, finance).

Deters Tailgating and Piggybacking

  • Purpose: Discourages people from entering secured areas by following others without scanning a credential.
  • Benefit: Strengthens per-person authentication, especially at critical security points.

Improves Audit and Incident Response

  • Purpose: Maintains a more accurate access log history.
  • Benefit: Allows faster and more reliable investigations when security breaches or incidents occur.

Enables Logical Access Pairing

  • Purpose: Links physical access to logical access (e.g., network login).
  • Benefit: Ensures users are logged into systems only when they are physically present in the building.

Increases Operational Control

  • Purpose: Forces users to follow defined traffic patterns (e.g., enter through the main lobby, exit through designated doors).
  • Benefit: Helps manage crowd flow, security checkpoint coverage, and staffing.

Reduces Risk of Occupancy Overload

  • Purpose: Limits the number of people in a given area at any one time.
  • Benefit: Useful for high-security zones, labs, or rooms with occupancy limits (fire code, clean rooms, etc.).

Industry Segments

Here’s a breakdown of how different commercial industries apply anti-passback:

Corporate Office Buildings

  • Use Case: Preventing employees from “buddy-badging” others into secured areas.
  • Example: Employees must badge in and out of a high-security R&D lab or executive suite.

Data Centers

  • Use Case: Enforcing strict audit trails for every entry and exit.
  • Example: Technicians cannot badge into a server room unless they’ve properly exited previously, helping ensure tight compliance with SOC 2 or ISO 27001.

Manufacturing and Warehousing

  • Use Case: Managing time and attendance and ensuring safe evacuation procedures.
  • Example: Workers badge in at the start of a shift; anti-passback ensures only present workers are recorded in the building for safety drills or emergencies.

Education and Research Institutions

  • Use Case: Controlling access to restricted labs or testing facilities.
  • Example: Students or researchers must badge out of clean rooms before they can re-enter, reducing contamination and enforcing accountability.

Healthcare Facilities

  • Use Case: Securing medication storage or surgical zones.
  • Example: Staff cannot re-enter drug dispensary rooms without properly badging out — this ensures individual access is logged and traceable.

Commercial Real Estate (Shared Workspaces, etc.)

  • Use Case: Preventing non-tenant access in shared environments.
  • Example: Tenants or contractors cannot “lend” badges to guests or friends to gain unauthorized access

Using Anti-Passback to Acclimate Employees Back to the Office

Anti-passback can be a strategic tool to help ease employees back into office routines while reinforcing attendance, accountability, and a sense of structure. Here’s how it can be thoughtfully used for return-to-office (RTO) efforts:

Reinforces Routine and Presence

  • Benefit: Employees scan in and out each day, re-establishing regular work habits and physical presence.
  • Tactic: Use the entry/exit data to support hybrid schedules — e.g., ensuring employees are present on their designated in-office days.

Supports a Trust-But-Verify Approach

  • Benefit: Encourages autonomy while gently enforcing accountability.
  • Tactic: Managers can use reports to confirm that team members are showing up consistently without intrusive check-ins.

Helps With Space Planning and Resource Allocation

  • Benefit: Anti-passback data shows how many employees are in the office and when.
  • Tactic: Use this insight to adjust cleaning schedules, security staffing, HVAC needs, or shared desk booking systems.

Encourages Safe Occupancy Monitoring

  • Benefit: Promotes a sense of security for employees concerned about overcrowding or emergency preparedness.
  • Tactic: Let employees know their presence is logged for emergency evacuation and space management purposes — not micromanagement.

Integrates Seamlessly with Wellness or Perk Programs

  • Benefit: Pair office attendance with perks (e.g., free lunches, parking passes, wellness credits).
  • Tactic: Trigger incentives based on verified in-office days via anti-passback logs (e.g., “badge in 3 days this week, get a coffee gift card”).

Reduces Badge Sharing in Hybrid Environments

  • Benefit: Prevents employees from “gaming” the system by having a friend badge in for them.
  • Tactic: Makes it clear that presence tracking is tied to legitimate entry/exit behavior, not just one-time check-ins.

Builds Data for HR and Facilities Team

  • Benefit: Provides objective usage metrics over time.
  • Tactic: HR can use this data to tailor RTO policies, and Facilities can monitor office re-engagement trends by team or department

Tips for Effective Implementation of Anti-Passback Features

Use Hardware That Supports Directional Logic

  • Install entry and exit readers at all controlled points.
  • Pair with turnstiles or optical gates where feasible for enforcement.

Define Logical vs Physical Anti-Passback

  • Hard Anti-Passback: Denies entry if proper exit hasn’t occurred — strict.
  • Soft Anti-Passback: Logs a violation but allows access — good for training or early adoption phases.

Set Grace Periods or Exceptions

  • Allow for system errors or emergencies by permitting admin override or setting time-based resets (e.g., after midnight)

Use with Video Surveillance Integration

  • Cross-reference access logs with video footage to verify compliance and investigate tailgating.

Combine with Mobile Credentials or Biometrics

  • Reduces badge sharing even further.
  • Encourages personalized access — especially valuable in high-risk zones.

Train Users and Security Staff

  • Make sure everyone understands how anti-passback works.
    Provide clear signage and onboarding to avoid frustration.

Communication Tips to Ensure Success

  • Frame anti-passback positively: as a way to ensure safety, comfort, and fairness, not as surveillance.
  • Communicate clearly with employees about why it’s being implemented and how it benefits them.
  • Provide self-service tools so employees can view their own access history and flag inconsistencies.

If you need help implementing Anti-passback technologies in your access control systems, we are here for you. Give us a call!

Upgraded Security with Alcatraz AI Facial Recognition: Your FACE is your CREDENTIAL!

By Gina Stuelke, CEO of Kenton Brothers

Upgraded Security with Alcatraz AI Facial Recognition: Your FACE is your CREDENTIAL!Overview

One of our customers, a major player in financial services, transportation logistics, and international trade, wanted to step up their physical security game. With a growing team and increasing security needs, the company needed an advanced access control system that was both seamless and highly secure. By rolling out Alcatraz AI’s facial recognition access control, we helped this customer create a hassle-free, high-tech security solution that improves efficiency and keeps their facilities safe.

Challenges

Before bringing in Alcatraz AI, this customer faced a few key security issues:

  • Key Card Hassles: Traditional access cards and codes were easy to lose, steal, or misuse.
  • Slow Entry Process: Employees sometimes got stuck at entry points due to lost or forgotten credentials.
  • Growing Pains: As the company expanded, it needed a security system that could scale easily.
  • Hygiene Concerns: In a post-pandemic world, a touch-free access solution was a must-have.

Solution

Kenton Brothers introduced Alcatraz AI’s facial recognition technology to upgrade its access control system.

Here’s what they got:

  • Effortless Access: Employees could simply walk up, get recognized, and enter—no more fumbling for badges.
  • Stronger Security: AI-driven facial recognition ensured that only authorized individuals could gain entry.
  • Easy Integration: The system worked smoothly with existing security setups, avoiding major disruptions.
  • Scalability: The technology easily adapts as the company continues to grow.
  • Touch-Free Convenience: Eliminating the need for physical touchpoints improved hygiene and safety.

Implementation and Results

Our customer rolled out Alcatraz AI at key entry points in its headquarters. We played a crucial role in the successful installation and programming of the new Alcatraz system, ensuring a seamless transition with minimal disruption to daily operations. Our expertise in access control allowed our customer to quickly and effectively deploy the technology. The process included:

  1. Planning & Customization: Security teams worked with Alcatraz AI and Kenton Brothers to identify priority areas and fine-tune the system.
  2. Professional Installation: Kenton Brothers handled the installation and programming, ensuring the system functioned flawlessly from day one.
  3. Smooth Deployment: The solution was seamlessly integrated with existing infrastructure, requiring minimal employee training.
  4. Ongoing Optimization: The company used real-time data and analytics to refine security measures post-launch.

The results spoke for themselves:

  • Drop in Credential Issues: Reduction in lost or stolen badges causing security headaches.
  • Faster Entry Times: Employees could get to work more quickly and efficiently.
  • Better Security Insights: Real-time monitoring helped security teams track access patterns and prevent potential threats.
  • Happier Employees: A smooth and secure entry experience boosted workplace convenience.

Conclusion

With Alcatraz AI’s facial recognition system in place, we helped our customer significantly improve their security while making daily operations smoother. We made sure that the installation and deployment were efficient and hassle-free. The technology’s ability to provide secure, touchless, and scalable access control helped future-proof the company’s security infrastructure. As our customer continues to grow, they’re confident that Alcatraz AI and our team at Kenton Brothers will keep up with their evolving needs.

Learn more about biometric technologies in the Alcatraz.ai Resource Center.

Hardware Bloat: The negatives of shoehorning equipment into a system.

By Baer Halvorson, Security Systems Engineer at Kenton Brothers

Hardware BloatAs an engineer, I look at photos of doors every single day. I zoom, I scroll, I furrow my brow, I scoff, I even take an immediate coffee break at the sight of some doors. Implementing security is a never-ending song of “just when you think you’ve seen it all…” One thing I want to highlight for a brief moment is a very specific problem that isn’t normal, but is common.

The door pictured is a perfect example of how time, multiple integrators, changing needs and the lack of system sterilization can cause problems. Shoehorning as much hardware as possible onto a door to fit the current need without proper removal of unnecessary devices creates a couple of major issues. Let’s break down how this happens by identifying what causes this problem; we’ll define system sterilization and its importance in the life-cycle of physical security systems and then we’ll address what to do to be smart and thorough in protecting the future of these systems.

The Setback

Not often enough do system integrators in the physical security space or clients needing security take into consideration the life-cycle of the system. There is no problem identifying the need, the integrator can easily identify the hardware for the moment and initial set up/billing are all very fluid processes in our industry. It’s only when you get to higher-level, usually enterprise systems, that the conversation of life-cycle comes into play. When this isn’t discussed in a medium to small security system, time can end up altering door design and the system itself can shift its purpose.

Hardware BloatFor example, perhaps the parking lot gets re-designed and now a door isn’t optimal for employee entry. Maybe the hardware takes a beating and the problem surrounding a device won’t resolve easily so the integrator pitches a different solution. All of this can lead to a door like the one pictured having hardware bloat, multiple locking devices, overlapping systems and more. The greatest threat posed by this issue is that there are now two to three times the amount of failure points and this door could end up easily compromised or become a burden to the system.

System Sterilization

The single greatest way to combat the issue of hardware bloat is system sterilization.

System sterilization is when a door needs to change for system purposes and security integrators remove the old defunct hardware from the site. This might incur more cost than leaving hardware on the door because you’ll need to patch holes, cover cuts, and repair frames to satisfy aesthetics. Often, because of this cost, the choice is made to leave the existing hardware even though you’re installing a new solution. This might not seem like a big issue for one door but over time, if obsolete devices are left in the field, you end up with a system that begins to become difficult to service and confusing to manage.

If a security manager or business owner audits their security program regularly, they can incorporate system sterilization and make sure that the system is running as lean as possible. This will cut time and save money in troubleshooting, and also satisfy the aesthetic of the space. When system sterilization is considered, the life-cycle of the physical security system is improved and lengthened providing better overall security and cost savings for its users.

Future Avoidance

Hardware BloatThere are a couple ways to make sure that access control, video surveillance and intrusion systems are avoiding the issue of hardware bloat.

The responsibility falls first to the customer’s security integrator; they are being paid to not just provide hardware but provide security solutions. The next person the responsibility falls on is the individual in charge of managing the system. Between the two of them, the integrator and system manager, they should be asking these three questions at every audit or change to the system:

  1. Is there any hardware installed in the field that is not in use?
  2. Are there any areas that have redundant devices that don’t call for it? (Redundancy is not to be avoided but appropriately implemented.)
  3. Are there solutions implemented within the system that are overkill?

Conclusion

Understanding that hardware bloat can slowly creep into a system and cause issues is the first major step to making sure that a physical security system is serving its purpose. Knowing what system sterilization is and how it can extend the life-cycle of a system will improve overall security and help provide financial savings. It’s important to keep an eye on this at every audit and/or change to the system and asking how the system can be further sterilized. Applying this to physical security systems will help keep the world a safer place which is the ultimate goal of physical security!

If hardware bloat is a problem for your business, and you’re not sure how to clean it up, we can help. Give us a call!