Upgraded Security with Alcatraz AI Facial Recognition: Your FACE is your CREDENTIAL!

By Gina Stuelke, CEO of Kenton Brothers

Upgraded Security with Alcatraz AI Facial Recognition: Your FACE is your CREDENTIAL!Overview

One of our customers, a major player in financial services, transportation logistics, and international trade, wanted to step up their physical security game. With a growing team and increasing security needs, the company needed an advanced access control system that was both seamless and highly secure. By rolling out Alcatraz AI’s facial recognition access control, we helped this customer create a hassle-free, high-tech security solution that improves efficiency and keeps their facilities safe.

Challenges

Before bringing in Alcatraz AI, this customer faced a few key security issues:

  • Key Card Hassles: Traditional access cards and codes were easy to lose, steal, or misuse.
  • Slow Entry Process: Employees sometimes got stuck at entry points due to lost or forgotten credentials.
  • Growing Pains: As the company expanded, it needed a security system that could scale easily.
  • Hygiene Concerns: In a post-pandemic world, a touch-free access solution was a must-have.

Solution

Kenton Brothers introduced Alcatraz AI’s facial recognition technology to upgrade its access control system.

Here’s what they got:

  • Effortless Access: Employees could simply walk up, get recognized, and enter—no more fumbling for badges.
  • Stronger Security: AI-driven facial recognition ensured that only authorized individuals could gain entry.
  • Easy Integration: The system worked smoothly with existing security setups, avoiding major disruptions.
  • Scalability: The technology easily adapts as the company continues to grow.
  • Touch-Free Convenience: Eliminating the need for physical touchpoints improved hygiene and safety.

Implementation and Results

Our customer rolled out Alcatraz AI at key entry points in its headquarters. We played a crucial role in the successful installation and programming of the new Alcatraz system, ensuring a seamless transition with minimal disruption to daily operations. Our expertise in access control allowed our customer to quickly and effectively deploy the technology. The process included:

  1. Planning & Customization: Security teams worked with Alcatraz AI and Kenton Brothers to identify priority areas and fine-tune the system.
  2. Professional Installation: Kenton Brothers handled the installation and programming, ensuring the system functioned flawlessly from day one.
  3. Smooth Deployment: The solution was seamlessly integrated with existing infrastructure, requiring minimal employee training.
  4. Ongoing Optimization: The company used real-time data and analytics to refine security measures post-launch.

The results spoke for themselves:

  • Drop in Credential Issues: Reduction in lost or stolen badges causing security headaches.
  • Faster Entry Times: Employees could get to work more quickly and efficiently.
  • Better Security Insights: Real-time monitoring helped security teams track access patterns and prevent potential threats.
  • Happier Employees: A smooth and secure entry experience boosted workplace convenience.

Conclusion

With Alcatraz AI’s facial recognition system in place, we helped our customer significantly improve their security while making daily operations smoother. We made sure that the installation and deployment were efficient and hassle-free. The technology’s ability to provide secure, touchless, and scalable access control helped future-proof the company’s security infrastructure. As our customer continues to grow, they’re confident that Alcatraz AI and our team at Kenton Brothers will keep up with their evolving needs.

Learn more about biometric technologies in the Alcatraz.ai Resource Center.

2025 Industry Trends in IP Video Surveillance

By David Strickland, Vice President of Kenton Brothers

2025 Industry Trends in IP Video SurveillanceThe IP video surveillance industry has been evolving rapidly, driven by advancements in artificial intelligence (AI), cybersecurity, edge computing, and cloud storage. As security concerns continue to grow, organizations are investing in cutting-edge surveillance technology to enhance their capabilities. Among the top players in this space, Hanwha Vision (formerly Hanwha Techwin) and Axis Communications lead the camera market, while Genetec and Milestone dominate in video management software (VMS).

Let’s explore some key trends shaping the industry and how these technologies are driving innovation.

1. AI-Powered Video Analytics

AI-driven analytics have become a major focus in IP video surveillance. Both Hanwha and Axis cameras incorporate AI-powered object detection, facial recognition, and behavior analysis, reducing false alarms and increasing the accuracy of alerts. These capabilities allow security teams to proactively respond to incidents and optimize monitoring efficiency.

A key industry trend is the increasing use of deep learning algorithms to improve the accuracy of AI-powered analytics. Traditional motion detection often leads to excessive false alarms, especially in dynamic environments. However, deep learning models can differentiate between humans, vehicles, and other objects with much greater precision, reducing unnecessary alerts and improving security response times.

Additionally, AI-powered cameras are now capable of detecting anomalies such as loitering, abandoned objects, or unusual crowd formations. These advanced analytics help organizations prevent incidents before they occur, shifting the focus from reactive to proactive security management.

Genetec and Milestone’s VMS platforms leverage AI to enhance forensic search capabilities, enabling operators to filter recorded footage based on object attributes like clothing color, vehicle type, or license plates. This drastically reduces investigation time and increases operational efficiency.

2. Cybersecurity in Video Surveillance

As cyber threats escalate, the security of IP surveillance systems has become a top priority. Manufacturers like Hanwha and Axis implement strong encryption, secure booting, and firmware authenticity checks to prevent unauthorized access and hacking attempts.

One of the most significant industry trends is the adoption of Zero Trust security models. This approach ensures that no device or user is automatically trusted, requiring continuous authentication and monitoring to mitigate potential threats. IP video surveillance systems are now being designed with multi-factor authentication (MFA), role-based access control (RBAC), and end-to-end encryption to enhance security at every level.

Furthermore, regulatory compliance is playing a larger role in the industry. Organizations must adhere to frameworks such as GDPR, NIST, and CISA guidelines, which require comprehensive audit logs, automated patch management, and vulnerability assessments. Genetec and Milestone have integrated advanced cybersecurity features into their VMS platforms, allowing users to detect intrusions, monitor system integrity, and respond to cyber incidents in real-time.

Another growing concern is the rise of ransomware attacks targeting surveillance networks. To counteract this, manufacturers are embedding anomaly detection and AI-driven threat intelligence into their systems to identify and neutralize potential breaches before they cause significant damage.

3. The Shift to Edge Computing

Edge computing is revolutionizing how video data is processed. Instead of transmitting all footage to a central server, cameras with built-in processing capabilities analyze data on the edge, reducing bandwidth usage and improving response times.

Hanwha and Axis have introduced AI-enabled edge analytics that can perform real-time event detection and alert security personnel instantly. This reduces the need for constant human monitoring and enhances overall system efficiency. Milestone and Genetec’s platforms seamlessly integrate with edge analytics, allowing users to manage alerts and recorded data efficiently.

4. Cloud-Based Video Surveillance and Hybrid Storage

The demand for cloud-based video surveillance solutions is growing as organizations seek scalable, cost-effective storage options. While fully cloud-based systems are not yet the standard for enterprise security, hybrid models—where footage is stored both on-premises and in the cloud—are becoming increasingly popular.

Genetec and Milestone offer cloud-ready VMS solutions that provide flexibility in storage and disaster recovery. Hanwha and Axis cameras are designed to integrate with cloud platforms, ensuring that critical footage remains accessible even in case of on-premise failures.

5. Integration with Access Control and IoT Devices

Modern security ecosystems require seamless integration between video surveillance, access control, and IoT sensors. Genetec’s Security Center platform and Milestone’s XProtect VMS provide extensive support for third-party access control systems, allowing organizations to link surveillance footage with entry logs, biometric authentication, and other security events.

Hanwha and Axis cameras support open standards like ONVIF, making it easier for businesses to integrate their surveillance systems with a wide range of security technologies. These integrations enhance situational awareness and improve incident response times.

6. Advancements in 4K and Multi-Sensor Cameras

The demand for high-resolution video quality continues to rise. Hanwha and Axis are pushing the boundaries with 4K, multi-sensor, and panoramic cameras that provide superior image clarity and wide-area coverage. These advancements reduce the number of cameras required for large installations, lowering infrastructure costs while improving overall surveillance quality.

Transformation

The IP video surveillance industry is undergoing a significant transformation, with AI, cybersecurity, edge computing, and cloud integration shaping the future of security. Hanwha and Axis continue to innovate in camera technology, while Genetec and Milestone lead the way in VMS advancements. Organizations looking to enhance their security posture must consider these trends when upgrading their surveillance infrastructure to ensure they stay ahead in an ever-evolving threat landscape.

Does your company need help with all of this? We are here for you. Give us a call.

Blue Team and Red Team: Moving Security from Defense to Offense

By Neal Bellamy, IT Director at Kenton Brothers

Blue Team and Red Team: Moving Security from Defense to OffenseOften our security systems are in a defensive position. A Video Management System can be used to find out what happened forensically. Our Access Control Systems are used to deny access to sensitive areas or equipment. Gunshot detection systems detect the gunshot after it happens. I don’t mean to say these systems aren’t important. In fact, they’re the foundation that is required. Without these systems, there is no option of doing anything better. However, once you have the foundation, there are ways to move to the offensive position.

Blue Team and Red Team

In IT network security, there are two teams. One is called the Blue Team. The other is called the Red Team.

The Blue team defends the castle. They put systems in to protect the IT infrastructure from someone who would like to steal data or hold data hostage. The attacking team is called the Red team. This team uses any weakness they can find and leverage into a successful attack. I once heard a presenter say the Blue team has to be right every time while the Red team only has to be right once. This is true of physical security also. Typically, the systems have to be right every time.

The main barrier to moving physical security systems from defense to offense is data. You first have to collect enough data to make an informed decision. Then you have to be able to discard the unimportant data while sifting out the relevant bits of information. We as humans are not great at doing either quickly. If you take a moment to really break it down, an investigation is also gathering data and getting to the important bits, but we consider an investigation to be after the fact and slow. What if we could move the investigation to near real-time and much faster? This is where I think physical security is going.

Machine Learning and Artificial Intelligence

Machine Learning (ML) and Artificial Intelligence (AI) will take the task of gathering data and processing it into results from something that happens after the fact to happening in real-time.

Like all new technology, growth starts out small and then builds upon itself until it expands at a dizzying pace. I believe we are just before the explosion of ML and AI in commercial security. We’ve been seeing AI in video surveillance cameras for a few years, but so far, most examples are not actionable. Cameras have been able to detect things like Man, Woman, Shirt, and Pants Color, etc. but unless all the bad guys start wearing red shirts, the data cannot yet lead to action.

However, we are seeing a few examples of AI helping us take action quickly.

New AI applications added to cameras are detecting weapons, both concealed and exposed. AI is also being applied to scanning stations for weapon detection. AI is being connected to the log of the access control system to detect “Unusual” events. While these are isolated to limited detection types, this is only the beginning. Better models will be built. Eventually, AI will be combining data from multiple systems and giving us a more thorough look at our physical security landscape.

Eventually, I think AI will take our systems on the offensive. We will be able to detect weapons at the door and see when someone is using Bob’s credentials across the country from where Bob just scanned in. We’ll see when someone is trying to defeat a reader, etc. I hope that we never hit the “Minority Report” level of technology in commercial security, but somewhere between that futuristic possibility and today would be ideal.

Interested in learning more about all the changes happening in commercial security and how our solutions may benefit your company? Give us a call.

Unlocking the Future: What’s next in commercial security?

By Gina Stuelke, CEO of Kenton Brothers

What’s next in commercial security?Over the last decade, we’ve experienced two major types of convergence: Physical security and IP networks, and then came Physical security and Cyber security.

The next major convergence in commercial security technology is likely to involve unified AI-driven platforms that seamlessly integrate cybersecurity, physical security, and IoT (Internet of Things) systems.

This would bring together several trends and advancements:

1. AI-Powered Threat Detection and Response

  • Predictive Security: AI models capable of forecasting potential breaches or attacks based on behavioral analytics. This goes beyond reactive measures, using machine learning to detect anomalies before an event occurs.
  • Autonomous Systems: Drones, robotic surveillance, and even autonomous security guards controlled by AI could patrol areas, responding to security incidents in real time without human intervention.

2. Cyber-Physical Fusion

  • The lines between cybersecurity and physical security will blur further. IoT devices (e.g., smart cameras, connected door locks) will not only detect physical breaches but also monitor network vulnerabilities. This creates a multi-layered defense against both digital and physical threats, closing gaps between the two domains.
  • Zero Trust Architecture: Every device or person accessing a system will need continuous verification, whether for physical entry or access to sensitive digital resources, reducing potential attack vectors.

3. Blockchain for Secure Authentication

  • Blockchain technology could revolutionize identity management, ensuring tamper-proof access control across various systems. It will allow for decentralized, secure authentication for all connected devices and users, ensuring data integrity and eliminating single points of failure.

4. Edge Computing for Faster, Localized Response

  • Instead of relying on the cloud, edge computing will allow security devices to process data locally for faster threat response. For example, a surveillance camera would be able to identify a security risk and trigger an alert immediately, without needing cloud processing.

5. Biometric and Behavioral Authentication

  • Beyond facial recognition, systems will start analyzing biometric and behavioral traits in real-time. This could include gait analysis, heart rate, or even brainwave patterns for security clearance, adding another layer of complexity and accuracy in authentication.

6. Cloud-Native Security Systems

  • The shift to cloud-native security infrastructures will continue, offering scalable and flexible solutions. Centralized AI will analyze and manage security systems across multiple physical locations, with a focus on real-time, remote management.

7. Quantum-Resistant Cryptography

  • With the advent of quantum computing, traditional cryptographic systems will become vulnerable. The next convergence will likely involve quantum-resistant encryption to protect sensitive data and communication channels in both digital and physical security networks.

8. Human-AI Collaboration in Security

  • Rather than replacing human security professionals, AI will act as an augmentation tool. AI systems will flag threats and provide suggestions, while humans maintain decision-making roles in high-stakes scenarios.

9. Augmented Reality (AR) in Security Operations

  • AR-enhanced interfaces will be used by security professionals for real-time threat visualization, allowing them to view live data, camera feeds, and analytics through wearable devices like AR glasses, streamlining responses during security breaches.

10. Privacy-Enhancing Technologies

  • As surveillance expands, privacy-preserving technologies (such as homomorphic encryption or differential privacy) will grow in importance to balance security needs with individual privacy concerns, ensuring that security doesn’t compromise personal data rights.

This convergence would result in unified, intelligent, and proactive security ecosystems that can address an increasingly sophisticated range of threats, blending the digital and physical worlds with advanced AI and decentralized technologies. If you could use help navigating the always changing landscape of commercial security, give us a call. We are here for you.

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.

By Gina Stuelke, CEO of Kenton Brothers 

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.In line with our core values of continuous learning, innovation and customer focus, as a physical security integrator, Kenton Brothers is increasingly leveraging AI technology to enhance security operations, improve efficiency, and deliver advanced solutions to our clients.

Here’s how we’re putting AI to work:

1) AI-Powered Video Surveillance

  • Intelligent Video Analytics: AI algorithms can analyze video feeds in real-time to detect suspicious behaviors, unauthorized access, or potential threats. For example, AI can identify intruders, recognize objects (such as weapons), and track movements.
  • Facial Recognition: AI enables automated identification of individuals based on facial features, allowing for efficient access control and security checks.
  • Behavioral Analysis: AI can detect abnormal behaviors, such as loitering, aggressive movements, or unauthorized gatherings, alerting security personnel to potential risks.

2) Predictive Maintenance and Monitoring

  • Proactive System Maintenance: AI-driven analytics help predict when security equipment (such as cameras or alarms) might fail, enabling integrators to schedule maintenance before malfunctions occur. This reduces downtime and enhances system reliability.
  • Monitoring IoT Devices: AI helps manage and monitor IoT-connected security systems, ensuring these devices remain secure and functional.

3) Access Control and Authentication

  • Biometric Authentication: AI is used for facial recognition, fingerprint scanning, and iris detection, ensuring only authorized personnel can access secured areas. AI enhances accuracy by learning and improving identification over time.
  • Behavioral Biometrics: AI systems can analyze users’ behavioral patterns (such as typing speed or gait) to authenticate users dynamically, adding another layer of security beyond traditional credentials.

4) Cybersecurity and Threat Detection

  • AI for Intrusion Detection: AI helps monitor digital networks tied to physical security systems, identifying potential cyber threats such as hacking attempts or malware. Physical security integrators use AI to strengthen the digital defenses of connected security devices, preventing breaches.
  • Anomaly Detection: AI can flag abnormal behaviors in security networks, such as unexpected traffic patterns or unauthorized access attempts, allowing integrators to address cybersecurity vulnerabilities before they lead to physical security breaches.

5) Automation of Security Tasks

  • Automated Monitoring and Reporting: AI automates routine security tasks like monitoring large-scale environments or compiling daily security reports. This allows human operators to focus on more complex tasks.
  • Drones and Robotics: AI-powered drones and robots are being deployed to patrol large areas autonomously, monitoring for security risks, and reporting anomalies back to a central system.

6) Improved Incident Response

  • AI-Powered Threat Response: When AI detects a security breach or potential risk, it can trigger automated responses like locking doors, alerting security personnel, or deploying drones. AI systems can prioritize incidents based on severity, ensuring that the most urgent issues are addressed first.
  • Integrated Security Systems: AI helps integrate various security systems (video surveillance, access control, alarms) into one platform, providing a holistic view of security events and streamlining incident response.

7) Data-Driven Insights

  • Enhanced Decision-Making: AI helps physical security integrators analyze vast amounts of data from multiple sources (cameras, sensors, access logs) to provide actionable insights. This can include identifying vulnerabilities, optimizing security layouts, or predicting future threats.
  • Heat Mapping: AI can create heat maps of physical spaces based on foot traffic patterns. Clients can use these insights to improve security placement and better understand how spaces are being used.

8) Real-Time Alerts and Notifications

  • Smart Alerts: AI systems can provide real-time notifications to security teams based on detected risks or rule violations. Alerts are more precise, reducing false positives and allowing security teams to respond quickly and efficiently.

9) AI-Driven Command Centers

  • Centralized Management with AI: AI is used to streamline the operations of command centers where multiple security feeds are monitored. AI processes data and can escalate incidents automatically, helping integrators improve response times.
  • Virtual Assistants for Command Centers: AI chatbots or virtual assistants can help operators by providing quick access to relevant information, issuing commands, or managing routine tasks like activating or deactivating systems.

10) Cost Efficiency and Scalability

  • Optimized Resource Allocation: AI allows integrators to optimize the placement and use of security personnel. For example, it can flag areas of concern, allowing security officers to focus on specific zones rather than patrolling areas that don’t need attention.
  • Scalability: AI-driven systems are more scalable than traditional security setups. As security needs grow, AI can manage and analyze larger datasets without a proportional increase in manpower, making security operations more cost-efficient.

Artificial Intelligence is transforming physical security by automating and enhancing traditional  security processes, improving threat detection, and enabling smarter, more proactive security solutions. Kenton Brothers is able to offer more advanced and efficient systems that better protect assets and people while reducing costs and human labor.

If you are ready to take advantage of all that AI is bringing to commercial security, please give us a call. Let’s work together to create solutions to your security concerns!