AI Takes Center Stage at ISC West 2025: Transforming Security with Intelligence and Integrity

By David Strickland, Vice President of Kenton Brothers

AI Takes Center Stage at ISC West 2025: Transforming Security with Intelligence and IntegrityThe 2025 ISC West conference in Las Vegas underscored a pivotal shift in the security industry: the integration of artificial intelligence (AI) into physical security systems. This transformation is not merely technological, but strategic, redefining how organizations approach threat detection, response, and overall security management.

The Rise of AI in Physical Security

AI’s prominence at ISC West 2025 was unmistakable. Sessions like “AI in Physical Security: Beyond Traditional Surveillance” highlighted how AI enhances surveillance systems through advanced analytics, facial recognition, and behavior analysis. These technologies enable security systems to not only detect threats but also predict and prevent them, shifting from reactive to proactive security measures .

Another session, “Driving Intelligence: How AI and Technology Are Transforming Remote Video Monitoring,” discussed the integration of AI with cloud technologies to revolutionize remote monitoring. This combination allows for real-time awareness and faster response times, significantly improving incident management and prevention.

Cyber-Physical Security Convergence

AI Takes Center Stage at ISC West 2025: Transforming Security with Intelligence and IntegrityThe convergence of cybersecurity and physical security was a recurring theme. As organizations increasingly adopt digital transformation initiatives, the integration of AI-driven software and sensor solutions becomes critical. Sessions like “The New Landscape for Cyber-Physical Security: AI-Driven Software and Sensors” explored how these technologies are reshaping security systems to better protect people, facilities, and data assets This convergence addresses the growing need for hybrid security platforms that bridge the gap between digital and physical threats, ensuring comprehensive protection in an increasingly interconnected world.

Cost Efficiency Through AI Integration

One of the significant advantages of integrating AI into security systems is cost efficiency. AI-powered analytics reduce the need for constant human monitoring by automating threat detection and response. This automation not only lowers labor costs but also minimizes false alarms, reducing unnecessary expenditures on emergency responses.

Moreover, AI enables predictive maintenance of security equipment, identifying potential failures before they occur. This proactive approach reduces downtime and maintenance costs, ensuring that security systems remain operational and effective.

Kenton Brothers Systems for Security: Embracing Innovation with Integrity

AI Takes Center Stage at ISC West 2025: Transforming Security with Intelligence and IntegrityAt Kenton Brothers Systems for Security, we’ve been at the forefront of security innovation for over 128 years. Our commitment to delivering remarkable solutions is rooted in our core values of integrity, excellence, and customer focus.

We leverage AI technologies to enhance our security offerings, integrating advanced analytics into surveillance systems to provide real-time threat detection and response. Our approach ensures that clients receive tailored solutions that address their unique security challenges while optimizing operational efficiency.

Our participation in ISC West 2025 reaffirmed our dedication to staying ahead of industry trends and adopting technologies that align with our mission. By embracing AI and other emerging technologies, we continue to provide our clients with innovative, reliable, and cost-effective security solutions.

Looking Ahead: The Future of AI in Security

The insights gained from ISC West 2025 make it clear that AI will continue to play a crucial role in the evolution of security systems. As technology advances, we anticipate further integration of AI into various aspects of security, from access control to emergency response.

At Kenton Brothers, we remain committed to exploring and implementing these advancements, ensuring that our clients benefit from the most effective and efficient security solutions available. Our legacy of excellence and innovation positions us to lead in this new era of intelligent security.

For more information on how Kenton Brothers Systems for Security can help you harness the power of AI in your security strategy, contact us directly.

Upgraded Security with Alcatraz AI Facial Recognition: Your FACE is your CREDENTIAL!

By Gina Stuelke, CEO of Kenton Brothers

Upgraded Security with Alcatraz AI Facial Recognition: Your FACE is your CREDENTIAL!Overview

One of our customers, a major player in financial services, transportation logistics, and international trade, wanted to step up their physical security game. With a growing team and increasing security needs, the company needed an advanced access control system that was both seamless and highly secure. By rolling out Alcatraz AI’s facial recognition access control, we helped this customer create a hassle-free, high-tech security solution that improves efficiency and keeps their facilities safe.

Challenges

Before bringing in Alcatraz AI, this customer faced a few key security issues:

  • Key Card Hassles: Traditional access cards and codes were easy to lose, steal, or misuse.
  • Slow Entry Process: Employees sometimes got stuck at entry points due to lost or forgotten credentials.
  • Growing Pains: As the company expanded, it needed a security system that could scale easily.
  • Hygiene Concerns: In a post-pandemic world, a touch-free access solution was a must-have.

Solution

Kenton Brothers introduced Alcatraz AI’s facial recognition technology to upgrade its access control system.

Here’s what they got:

  • Effortless Access: Employees could simply walk up, get recognized, and enter—no more fumbling for badges.
  • Stronger Security: AI-driven facial recognition ensured that only authorized individuals could gain entry.
  • Easy Integration: The system worked smoothly with existing security setups, avoiding major disruptions.
  • Scalability: The technology easily adapts as the company continues to grow.
  • Touch-Free Convenience: Eliminating the need for physical touchpoints improved hygiene and safety.

Implementation and Results

Our customer rolled out Alcatraz AI at key entry points in its headquarters. We played a crucial role in the successful installation and programming of the new Alcatraz system, ensuring a seamless transition with minimal disruption to daily operations. Our expertise in access control allowed our customer to quickly and effectively deploy the technology. The process included:

  1. Planning & Customization: Security teams worked with Alcatraz AI and Kenton Brothers to identify priority areas and fine-tune the system.
  2. Professional Installation: Kenton Brothers handled the installation and programming, ensuring the system functioned flawlessly from day one.
  3. Smooth Deployment: The solution was seamlessly integrated with existing infrastructure, requiring minimal employee training.
  4. Ongoing Optimization: The company used real-time data and analytics to refine security measures post-launch.

The results spoke for themselves:

  • Drop in Credential Issues: Reduction in lost or stolen badges causing security headaches.
  • Faster Entry Times: Employees could get to work more quickly and efficiently.
  • Better Security Insights: Real-time monitoring helped security teams track access patterns and prevent potential threats.
  • Happier Employees: A smooth and secure entry experience boosted workplace convenience.

Conclusion

With Alcatraz AI’s facial recognition system in place, we helped our customer significantly improve their security while making daily operations smoother. We made sure that the installation and deployment were efficient and hassle-free. The technology’s ability to provide secure, touchless, and scalable access control helped future-proof the company’s security infrastructure. As our customer continues to grow, they’re confident that Alcatraz AI and our team at Kenton Brothers will keep up with their evolving needs.

Learn more about biometric technologies in the Alcatraz.ai Resource Center.

2025 Industry Trends in IP Video Surveillance

By David Strickland, Vice President of Kenton Brothers

2025 Industry Trends in IP Video SurveillanceThe IP video surveillance industry has been evolving rapidly, driven by advancements in artificial intelligence (AI), cybersecurity, edge computing, and cloud storage. As security concerns continue to grow, organizations are investing in cutting-edge surveillance technology to enhance their capabilities. Among the top players in this space, Hanwha Vision (formerly Hanwha Techwin) and Axis Communications lead the camera market, while Genetec and Milestone dominate in video management software (VMS).

Let’s explore some key trends shaping the industry and how these technologies are driving innovation.

1. AI-Powered Video Analytics

AI-driven analytics have become a major focus in IP video surveillance. Both Hanwha and Axis cameras incorporate AI-powered object detection, facial recognition, and behavior analysis, reducing false alarms and increasing the accuracy of alerts. These capabilities allow security teams to proactively respond to incidents and optimize monitoring efficiency.

A key industry trend is the increasing use of deep learning algorithms to improve the accuracy of AI-powered analytics. Traditional motion detection often leads to excessive false alarms, especially in dynamic environments. However, deep learning models can differentiate between humans, vehicles, and other objects with much greater precision, reducing unnecessary alerts and improving security response times.

Additionally, AI-powered cameras are now capable of detecting anomalies such as loitering, abandoned objects, or unusual crowd formations. These advanced analytics help organizations prevent incidents before they occur, shifting the focus from reactive to proactive security management.

Genetec and Milestone’s VMS platforms leverage AI to enhance forensic search capabilities, enabling operators to filter recorded footage based on object attributes like clothing color, vehicle type, or license plates. This drastically reduces investigation time and increases operational efficiency.

2. Cybersecurity in Video Surveillance

As cyber threats escalate, the security of IP surveillance systems has become a top priority. Manufacturers like Hanwha and Axis implement strong encryption, secure booting, and firmware authenticity checks to prevent unauthorized access and hacking attempts.

One of the most significant industry trends is the adoption of Zero Trust security models. This approach ensures that no device or user is automatically trusted, requiring continuous authentication and monitoring to mitigate potential threats. IP video surveillance systems are now being designed with multi-factor authentication (MFA), role-based access control (RBAC), and end-to-end encryption to enhance security at every level.

Furthermore, regulatory compliance is playing a larger role in the industry. Organizations must adhere to frameworks such as GDPR, NIST, and CISA guidelines, which require comprehensive audit logs, automated patch management, and vulnerability assessments. Genetec and Milestone have integrated advanced cybersecurity features into their VMS platforms, allowing users to detect intrusions, monitor system integrity, and respond to cyber incidents in real-time.

Another growing concern is the rise of ransomware attacks targeting surveillance networks. To counteract this, manufacturers are embedding anomaly detection and AI-driven threat intelligence into their systems to identify and neutralize potential breaches before they cause significant damage.

3. The Shift to Edge Computing

Edge computing is revolutionizing how video data is processed. Instead of transmitting all footage to a central server, cameras with built-in processing capabilities analyze data on the edge, reducing bandwidth usage and improving response times.

Hanwha and Axis have introduced AI-enabled edge analytics that can perform real-time event detection and alert security personnel instantly. This reduces the need for constant human monitoring and enhances overall system efficiency. Milestone and Genetec’s platforms seamlessly integrate with edge analytics, allowing users to manage alerts and recorded data efficiently.

4. Cloud-Based Video Surveillance and Hybrid Storage

The demand for cloud-based video surveillance solutions is growing as organizations seek scalable, cost-effective storage options. While fully cloud-based systems are not yet the standard for enterprise security, hybrid models—where footage is stored both on-premises and in the cloud—are becoming increasingly popular.

Genetec and Milestone offer cloud-ready VMS solutions that provide flexibility in storage and disaster recovery. Hanwha and Axis cameras are designed to integrate with cloud platforms, ensuring that critical footage remains accessible even in case of on-premise failures.

5. Integration with Access Control and IoT Devices

Modern security ecosystems require seamless integration between video surveillance, access control, and IoT sensors. Genetec’s Security Center platform and Milestone’s XProtect VMS provide extensive support for third-party access control systems, allowing organizations to link surveillance footage with entry logs, biometric authentication, and other security events.

Hanwha and Axis cameras support open standards like ONVIF, making it easier for businesses to integrate their surveillance systems with a wide range of security technologies. These integrations enhance situational awareness and improve incident response times.

6. Advancements in 4K and Multi-Sensor Cameras

The demand for high-resolution video quality continues to rise. Hanwha and Axis are pushing the boundaries with 4K, multi-sensor, and panoramic cameras that provide superior image clarity and wide-area coverage. These advancements reduce the number of cameras required for large installations, lowering infrastructure costs while improving overall surveillance quality.

Transformation

The IP video surveillance industry is undergoing a significant transformation, with AI, cybersecurity, edge computing, and cloud integration shaping the future of security. Hanwha and Axis continue to innovate in camera technology, while Genetec and Milestone lead the way in VMS advancements. Organizations looking to enhance their security posture must consider these trends when upgrading their surveillance infrastructure to ensure they stay ahead in an ever-evolving threat landscape.

Does your company need help with all of this? We are here for you. Give us a call.

Blue Team and Red Team: Moving Security from Defense to Offense

By Neal Bellamy, IT Director at Kenton Brothers

Blue Team and Red Team: Moving Security from Defense to OffenseOften our security systems are in a defensive position. A Video Management System can be used to find out what happened forensically. Our Access Control Systems are used to deny access to sensitive areas or equipment. Gunshot detection systems detect the gunshot after it happens. I don’t mean to say these systems aren’t important. In fact, they’re the foundation that is required. Without these systems, there is no option of doing anything better. However, once you have the foundation, there are ways to move to the offensive position.

Blue Team and Red Team

In IT network security, there are two teams. One is called the Blue Team. The other is called the Red Team.

The Blue team defends the castle. They put systems in to protect the IT infrastructure from someone who would like to steal data or hold data hostage. The attacking team is called the Red team. This team uses any weakness they can find and leverage into a successful attack. I once heard a presenter say the Blue team has to be right every time while the Red team only has to be right once. This is true of physical security also. Typically, the systems have to be right every time.

The main barrier to moving physical security systems from defense to offense is data. You first have to collect enough data to make an informed decision. Then you have to be able to discard the unimportant data while sifting out the relevant bits of information. We as humans are not great at doing either quickly. If you take a moment to really break it down, an investigation is also gathering data and getting to the important bits, but we consider an investigation to be after the fact and slow. What if we could move the investigation to near real-time and much faster? This is where I think physical security is going.

Machine Learning and Artificial Intelligence

Machine Learning (ML) and Artificial Intelligence (AI) will take the task of gathering data and processing it into results from something that happens after the fact to happening in real-time.

Like all new technology, growth starts out small and then builds upon itself until it expands at a dizzying pace. I believe we are just before the explosion of ML and AI in commercial security. We’ve been seeing AI in video surveillance cameras for a few years, but so far, most examples are not actionable. Cameras have been able to detect things like Man, Woman, Shirt, and Pants Color, etc. but unless all the bad guys start wearing red shirts, the data cannot yet lead to action.

However, we are seeing a few examples of AI helping us take action quickly.

New AI applications added to cameras are detecting weapons, both concealed and exposed. AI is also being applied to scanning stations for weapon detection. AI is being connected to the log of the access control system to detect “Unusual” events. While these are isolated to limited detection types, this is only the beginning. Better models will be built. Eventually, AI will be combining data from multiple systems and giving us a more thorough look at our physical security landscape.

Eventually, I think AI will take our systems on the offensive. We will be able to detect weapons at the door and see when someone is using Bob’s credentials across the country from where Bob just scanned in. We’ll see when someone is trying to defeat a reader, etc. I hope that we never hit the “Minority Report” level of technology in commercial security, but somewhere between that futuristic possibility and today would be ideal.

Interested in learning more about all the changes happening in commercial security and how our solutions may benefit your company? Give us a call.

Unlocking the Future: What’s next in commercial security?

By Gina Stuelke, CEO of Kenton Brothers

What’s next in commercial security?Over the last decade, we’ve experienced two major types of convergence: Physical security and IP networks, and then came Physical security and Cyber security.

The next major convergence in commercial security technology is likely to involve unified AI-driven platforms that seamlessly integrate cybersecurity, physical security, and IoT (Internet of Things) systems.

This would bring together several trends and advancements:

1. AI-Powered Threat Detection and Response

  • Predictive Security: AI models capable of forecasting potential breaches or attacks based on behavioral analytics. This goes beyond reactive measures, using machine learning to detect anomalies before an event occurs.
  • Autonomous Systems: Drones, robotic surveillance, and even autonomous security guards controlled by AI could patrol areas, responding to security incidents in real time without human intervention.

2. Cyber-Physical Fusion

  • The lines between cybersecurity and physical security will blur further. IoT devices (e.g., smart cameras, connected door locks) will not only detect physical breaches but also monitor network vulnerabilities. This creates a multi-layered defense against both digital and physical threats, closing gaps between the two domains.
  • Zero Trust Architecture: Every device or person accessing a system will need continuous verification, whether for physical entry or access to sensitive digital resources, reducing potential attack vectors.

3. Blockchain for Secure Authentication

  • Blockchain technology could revolutionize identity management, ensuring tamper-proof access control across various systems. It will allow for decentralized, secure authentication for all connected devices and users, ensuring data integrity and eliminating single points of failure.

4. Edge Computing for Faster, Localized Response

  • Instead of relying on the cloud, edge computing will allow security devices to process data locally for faster threat response. For example, a surveillance camera would be able to identify a security risk and trigger an alert immediately, without needing cloud processing.

5. Biometric and Behavioral Authentication

  • Beyond facial recognition, systems will start analyzing biometric and behavioral traits in real-time. This could include gait analysis, heart rate, or even brainwave patterns for security clearance, adding another layer of complexity and accuracy in authentication.

6. Cloud-Native Security Systems

  • The shift to cloud-native security infrastructures will continue, offering scalable and flexible solutions. Centralized AI will analyze and manage security systems across multiple physical locations, with a focus on real-time, remote management.

7. Quantum-Resistant Cryptography

  • With the advent of quantum computing, traditional cryptographic systems will become vulnerable. The next convergence will likely involve quantum-resistant encryption to protect sensitive data and communication channels in both digital and physical security networks.

8. Human-AI Collaboration in Security

  • Rather than replacing human security professionals, AI will act as an augmentation tool. AI systems will flag threats and provide suggestions, while humans maintain decision-making roles in high-stakes scenarios.

9. Augmented Reality (AR) in Security Operations

  • AR-enhanced interfaces will be used by security professionals for real-time threat visualization, allowing them to view live data, camera feeds, and analytics through wearable devices like AR glasses, streamlining responses during security breaches.

10. Privacy-Enhancing Technologies

  • As surveillance expands, privacy-preserving technologies (such as homomorphic encryption or differential privacy) will grow in importance to balance security needs with individual privacy concerns, ensuring that security doesn’t compromise personal data rights.

This convergence would result in unified, intelligent, and proactive security ecosystems that can address an increasingly sophisticated range of threats, blending the digital and physical worlds with advanced AI and decentralized technologies. If you could use help navigating the always changing landscape of commercial security, give us a call. We are here for you.