Unlocking the Future: What’s next in commercial security?

By Gina Stuelke, CEO of Kenton Brothers

What’s next in commercial security?Over the last decade, we’ve experienced two major types of convergence: Physical security and IP networks, and then came Physical security and Cyber security.

The next major convergence in commercial security technology is likely to involve unified AI-driven platforms that seamlessly integrate cybersecurity, physical security, and IoT (Internet of Things) systems.

This would bring together several trends and advancements:

1. AI-Powered Threat Detection and Response

  • Predictive Security: AI models capable of forecasting potential breaches or attacks based on behavioral analytics. This goes beyond reactive measures, using machine learning to detect anomalies before an event occurs.
  • Autonomous Systems: Drones, robotic surveillance, and even autonomous security guards controlled by AI could patrol areas, responding to security incidents in real time without human intervention.

2. Cyber-Physical Fusion

  • The lines between cybersecurity and physical security will blur further. IoT devices (e.g., smart cameras, connected door locks) will not only detect physical breaches but also monitor network vulnerabilities. This creates a multi-layered defense against both digital and physical threats, closing gaps between the two domains.
  • Zero Trust Architecture: Every device or person accessing a system will need continuous verification, whether for physical entry or access to sensitive digital resources, reducing potential attack vectors.

3. Blockchain for Secure Authentication

  • Blockchain technology could revolutionize identity management, ensuring tamper-proof access control across various systems. It will allow for decentralized, secure authentication for all connected devices and users, ensuring data integrity and eliminating single points of failure.

4. Edge Computing for Faster, Localized Response

  • Instead of relying on the cloud, edge computing will allow security devices to process data locally for faster threat response. For example, a surveillance camera would be able to identify a security risk and trigger an alert immediately, without needing cloud processing.

5. Biometric and Behavioral Authentication

  • Beyond facial recognition, systems will start analyzing biometric and behavioral traits in real-time. This could include gait analysis, heart rate, or even brainwave patterns for security clearance, adding another layer of complexity and accuracy in authentication.

6. Cloud-Native Security Systems

  • The shift to cloud-native security infrastructures will continue, offering scalable and flexible solutions. Centralized AI will analyze and manage security systems across multiple physical locations, with a focus on real-time, remote management.

7. Quantum-Resistant Cryptography

  • With the advent of quantum computing, traditional cryptographic systems will become vulnerable. The next convergence will likely involve quantum-resistant encryption to protect sensitive data and communication channels in both digital and physical security networks.

8. Human-AI Collaboration in Security

  • Rather than replacing human security professionals, AI will act as an augmentation tool. AI systems will flag threats and provide suggestions, while humans maintain decision-making roles in high-stakes scenarios.

9. Augmented Reality (AR) in Security Operations

  • AR-enhanced interfaces will be used by security professionals for real-time threat visualization, allowing them to view live data, camera feeds, and analytics through wearable devices like AR glasses, streamlining responses during security breaches.

10. Privacy-Enhancing Technologies

  • As surveillance expands, privacy-preserving technologies (such as homomorphic encryption or differential privacy) will grow in importance to balance security needs with individual privacy concerns, ensuring that security doesn’t compromise personal data rights.

This convergence would result in unified, intelligent, and proactive security ecosystems that can address an increasingly sophisticated range of threats, blending the digital and physical worlds with advanced AI and decentralized technologies. If you could use help navigating the always changing landscape of commercial security, give us a call. We are here for you.

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.

By Gina Stuelke, CEO of Kenton Brothers 

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.In line with our core values of continuous learning, innovation and customer focus, as a physical security integrator, Kenton Brothers is increasingly leveraging AI technology to enhance security operations, improve efficiency, and deliver advanced solutions to our clients.

Here’s how we’re putting AI to work:

1) AI-Powered Video Surveillance

  • Intelligent Video Analytics: AI algorithms can analyze video feeds in real-time to detect suspicious behaviors, unauthorized access, or potential threats. For example, AI can identify intruders, recognize objects (such as weapons), and track movements.
  • Facial Recognition: AI enables automated identification of individuals based on facial features, allowing for efficient access control and security checks.
  • Behavioral Analysis: AI can detect abnormal behaviors, such as loitering, aggressive movements, or unauthorized gatherings, alerting security personnel to potential risks.

2) Predictive Maintenance and Monitoring

  • Proactive System Maintenance: AI-driven analytics help predict when security equipment (such as cameras or alarms) might fail, enabling integrators to schedule maintenance before malfunctions occur. This reduces downtime and enhances system reliability.
  • Monitoring IoT Devices: AI helps manage and monitor IoT-connected security systems, ensuring these devices remain secure and functional.

3) Access Control and Authentication

  • Biometric Authentication: AI is used for facial recognition, fingerprint scanning, and iris detection, ensuring only authorized personnel can access secured areas. AI enhances accuracy by learning and improving identification over time.
  • Behavioral Biometrics: AI systems can analyze users’ behavioral patterns (such as typing speed or gait) to authenticate users dynamically, adding another layer of security beyond traditional credentials.

4) Cybersecurity and Threat Detection

  • AI for Intrusion Detection: AI helps monitor digital networks tied to physical security systems, identifying potential cyber threats such as hacking attempts or malware. Physical security integrators use AI to strengthen the digital defenses of connected security devices, preventing breaches.
  • Anomaly Detection: AI can flag abnormal behaviors in security networks, such as unexpected traffic patterns or unauthorized access attempts, allowing integrators to address cybersecurity vulnerabilities before they lead to physical security breaches.

5) Automation of Security Tasks

  • Automated Monitoring and Reporting: AI automates routine security tasks like monitoring large-scale environments or compiling daily security reports. This allows human operators to focus on more complex tasks.
  • Drones and Robotics: AI-powered drones and robots are being deployed to patrol large areas autonomously, monitoring for security risks, and reporting anomalies back to a central system.

6) Improved Incident Response

  • AI-Powered Threat Response: When AI detects a security breach or potential risk, it can trigger automated responses like locking doors, alerting security personnel, or deploying drones. AI systems can prioritize incidents based on severity, ensuring that the most urgent issues are addressed first.
  • Integrated Security Systems: AI helps integrate various security systems (video surveillance, access control, alarms) into one platform, providing a holistic view of security events and streamlining incident response.

7) Data-Driven Insights

  • Enhanced Decision-Making: AI helps physical security integrators analyze vast amounts of data from multiple sources (cameras, sensors, access logs) to provide actionable insights. This can include identifying vulnerabilities, optimizing security layouts, or predicting future threats.
  • Heat Mapping: AI can create heat maps of physical spaces based on foot traffic patterns. Clients can use these insights to improve security placement and better understand how spaces are being used.

8) Real-Time Alerts and Notifications

  • Smart Alerts: AI systems can provide real-time notifications to security teams based on detected risks or rule violations. Alerts are more precise, reducing false positives and allowing security teams to respond quickly and efficiently.

9) AI-Driven Command Centers

  • Centralized Management with AI: AI is used to streamline the operations of command centers where multiple security feeds are monitored. AI processes data and can escalate incidents automatically, helping integrators improve response times.
  • Virtual Assistants for Command Centers: AI chatbots or virtual assistants can help operators by providing quick access to relevant information, issuing commands, or managing routine tasks like activating or deactivating systems.

10) Cost Efficiency and Scalability

  • Optimized Resource Allocation: AI allows integrators to optimize the placement and use of security personnel. For example, it can flag areas of concern, allowing security officers to focus on specific zones rather than patrolling areas that don’t need attention.
  • Scalability: AI-driven systems are more scalable than traditional security setups. As security needs grow, AI can manage and analyze larger datasets without a proportional increase in manpower, making security operations more cost-efficient.

Artificial Intelligence is transforming physical security by automating and enhancing traditional  security processes, improving threat detection, and enabling smarter, more proactive security solutions. Kenton Brothers is able to offer more advanced and efficient systems that better protect assets and people while reducing costs and human labor.

If you are ready to take advantage of all that AI is bringing to commercial security, please give us a call. Let’s work together to create solutions to your security concerns!

From Legacy to Leading Edge: A visual journey through the evolution of security technology

From Legacy to Leading EdgeBy Gina Stuelke, CEO of Kenton Brothers

Back in 2008, our industry experienced a significant convergence event joining physical security and IP based networks onto a common platform. This was a major shift away from the disparate systems we had become accustomed to. That seems like such a long time ago! Today, we are involved in another convergence event involving physical security and cyber security.

The two pyramids in the images below represent the technology stacks used by Kenton Brothers, with each layer reflecting the progression of security technologies and how our offerings have elevated over time.

Kenton Brothers 2008 Technology Pyramid

Kenton Brothers Systems for Security: Pyramid1. Base Layer (Mechanical Locking Hardware): Traditional, physical locking systems.
2. High Security Cylinders and Masterkey System Implementation: The introduction of advanced physical keys and locks.
3. Legacy and Stand-Alone Access Control and Analog Video Surveillance Systems: Initial electronic security measures, such as standalone access systems, video surveillance and analog technologies.
4. Network-Based (IP) Access Control and Video Surveillance Systems: The shift to internet-based systems, improving remote access and integration.
5. Integration Services: Combining different systems (video, access control, etc.) for better coordination and ease of use.
6. Hosted and Managed Services: Outsourcing and cloud-based security management to external providers.
7. Video Analytics: Using software to analyze video data and identify suspicious activities automatically.

Kenton Brothers 2024 Technology Pyramid

Kenton Brothers Technology Pyramid1. Base Layer (Security Policies and Procedures): Security begins with robust organizational policies and procedures, a foundational aspect in modern security systems.
2. High Security Physical Hardware: Continues from previous physical security technologies but is more sophisticated.
3. Detection: Active detection systems for unauthorized access or incidents (includes sensors, alarms, etc.).
4. Access Control: Advances in access control technology (includes biometric and smart credentials).
5. Video Surveillance: Video monitoring remains central, but with higher resolution, better storage, and cloud integration.
6. Analytics and AI Support: Modern video surveillance includes AI, improving event detection and proactive analysis.
7. Cyber Hardening: Reflects the growing importance of cybersecurity, securing systems from hacking and digital threats.

What are the comparisons in technological advances?

  • Shift from Analog to IP: Over the last decade, analog systems (present in the first pyramid) have largely been replaced by IP-based systems, which allow for higher quality video and easier integration into larger networks.
  • Integration of AI and Analytics: Modern systems (second pyramid) emphasize the use of AI for proactive security management. This shift moves beyond video analytics to AI-supported threat detection, reducing human workload and improving accuracy.
  • Focus on Cybersecurity: The first pyramid lacks any mention of cybersecurity, which has become essential in modern security infrastructures due to the increasing threat of hacking. Cyber hardening in the second pyramid highlights this critical evolution.
  • Increased Use of Cloud Services: The second pyramid also reflects advances in cloud technologies for video storage, processing, and real-time analytics—leading to more flexible, scalable, and manageable systems.
  • Detection Technologies: Detection is more advanced in the second pyramid, likely including smarter sensors and automated systems integrated with AI.

Security systems have evolved from primarily physical and standalone solutions (first pyramid) to highly integrated, AI-driven, and cyber-secure ecosystems (second pyramid). These technological shifts have led to more automated, efficient, and intelligent systems capable of responding to modern-day security threats.

Has your commercial security stack been in place for a long time? It may be time to take a good look to make sure you are keeping up with the aggressive changes in technology. And if you need help, please give us a call!

Door Naming Conventions – Keeping Businesses Organized and Secure

By Neal Bellamy, IT Director at Kenton Brothers

Door Naming ConventionsOne of the most critical aspects of planning a commercial security system design for a facility is organization. Taking the time to get the details right ensures that all users of the system easily understand how the various components and functions will work together. One of the topics that can cause a lot of confusion is how to verbally reference a specific door inside your building(s).

Depending on the size and nature of your business, an organization can end up having to secure a lot of doors!

Part of the KB Advantage is that we take pride in creating custom solutions for our clients. And that’s not marketing speak… We actually enjoy the process of working with you to design customized commercial security systems that will protect your people, property and possessions. We also like partnering with you to maintain or update your existing commercial security systems. Knowing that employees feel safer, and security officers have more confidence in their system, puts a smile on our face.

Regardless of the size of your access control system, it’s a good rule of thumb to have a naming convention established for the various doors in your system. For smaller systems, this is as easy as naming a door Main Entry or Employee Door. But what about when we’re talking about a system that has 10, 20, or even 500 doors? This is where you will see the value of our 127 years of experience providing commercial security solutions to businesses nationally.

A Conversation with Vince

Door Naming ConventionsI sat down with one of our employees, Vince Gelei, to learn more about our best practices for door naming conventions. Vince is experienced in the process of building and programming the many access control systems we provide for our customers.

Sometimes, it’s hard to put into perspective the number of devices that are involved in the access control programming for a single door. Without having some structure, the system can become convoluted and hard for both the end user and integrator to operate and maintain. Vince provided some great insight on the key factors for developing such a framework within an access control system:

  • End User’s Security Capacity – Determining the technical level of our customers plays a big part in system design. (We can’t provide a solution that’s hard for our customers to understand and use.) We want to make sure the final naming conventions will be an intuitive reference for the end user. This is the first priority in system programming.
  • Access Control System – The commercial security system that the customer has chosen also plays a big part in how we set up naming conventions. The capabilities of their system dictate what we can and cannot do when setting up doors and their naming structure.
  • Territory or Location – We would want to set up a City Reference if you have a national presence. For a specific region all the way down to a single building, we would set up a Building Reference. (These terms are the first step in verbally referencing a specific door.)
  • Total Door Count of Site – When we know ahead of time how many doors are on site and how they function, we can document this in your access control system. (This is not a feature supported in all access control platforms. This is another reason why our system design process is critical.)
  • Site Floor Plans – With existing floor plans we can document the solution for quick reference.
  • Door Numbers – Do the facilities have pre-established door numbers? If your building already has door numbers, we would simply leverage that convention.
  • Potential for Growth – Is this just the first phase of implementing a commercial security solution for your organization? If so, we want to plan for future phases and the growth of your organization. Trying to develop this afterwards can be a nightmare!

Door Naming ConventionsVince also goes on to explain, “A door could be named doors, access points, portals, etc. in your existing system. We help our customers rename them in a way that end users operating the system will be able to quickly identify the physical location of any door. Of course, with larger sites there is more complexity. We work with the end user to create a site-specific nomenclature that is typically composed of literal door numbering, but also acronyms to codify and differentiate the different locations.”

The overall recommendation from Vince is that door naming is a small but important detail when planning out your security system.

At Kenton Brothers, we have the experience of working closely with our customers and partners to design and implement customized commercial security solutions. Whether it’s time for you to plan and build out your first solution or update your existing security systems, give us a call. We would love to help you.

Does your access control have a WOW factor?

By Neal Bellamy, IT Director at Kenton Brothers

Does your access control have a WOW factor?Access control is typically a Ho-Hum discussion. Who gets access to your doors? When during the day do they get access? Do you want pictures on your badges? What doesn’t get discussed often is how access control can make it easier to manage your facility. Ease of use is vastly different across access control platforms. Your decision on access control software can significantly affect how you manage your facility!

First, let’s start with site plans, or maps. 

Suppose you have someone that is watching your facilities, like a guard, SRO, or facility manager. In that case, a site plan can give you a visual representation of your facility and its security at a glance. For instance, in Gallagher, the site plan can show you if all the doors are open or closed, locked or unlocked, the last person who scanned through the door, whether it has been propped open or even forced open.

Does your access control have a WOW factor?If your Gallagher system is integrated with your camera system, the site plan will show you nearby cameras on the site plan. Likewise, if the intercom system is connected, the site plan allows you to talk to the person at the intercom, all through one interface.

Since Gallagher has a built-in intrusion system, showing the alarm status as well as arming and disarming can all be done through the site plan as well. Finally putting it all together, for facilities that are actively monitoring their system and you have an alarm where a door is forced open, or any other type of event, the alarm manager can show you on the map where the event is taking place, any cameras in the area, whether the alarm is armed and the last person who swiped through the door.

Although a common phrase at Kenton Brothers is that security and convenience don’t mix, mobile credentials are the exception.

Does your access control have a WOW factor?From a convenience perspective, mobile (or sometimes called Bluetooth) credentials can be issued easily through a web portal or software via text or email. Mobile credentials can be issued from hours and hundreds of miles away. From a security perspective, mobile credentials are already more secure than most physical cards. Usually, the cards have to be activated by the user, which makes cloning harder. In some instances, the credential is tied directly to the access control system and has a more unique identifier. Then on top of the already more secure credential, they normally can be combined for a multi-factor authentication like face id, fingerprint, or pin number.

Mobile credentials come in a couple of flavors, two independent systems for mobile credentials and access control, which is a little less convenient, and one combined, or integrated, system which is easier to use. Gallagher offers all of these convenience and security features. Furthermore, five mobile credentials come with every system so you can try it for yourself!

The next WOW! factor component is a mobile app to control your system from afar.

Does your access control have a WOW factor?Mobile apps are split fairly well among access control systems. Systems that have been around for decades are struggling to convert their very robust systems to also include a mobile app that has basic functionality. Newer systems that might have only been around for 5-8 years may only have a mobile app, but lack deeper access control features you might need. Gone are the days when our workforce comes in at 9 am, takes an hour’s lunch, and leaves the office at 5 pm.

People are working the hours that work for them, their family, and their business. This means visitors might come at all hours, people could get locked out while walking their dogs or stepping out for a late-night snack. A Mobile app gives authorized people the ability to allow approved staff into the office from anywhere with internet access. Good mobile apps also allow viewing and disabling cardholders as well as arming and disarming alarms.

Gallagher offers all of these features and even adds an evacuation process where you can account for everyone quickly, in case of an emergency. Just like mobile credentials, Gallagher includes one mobile app connection for each system.

Does your access control have a WOW factor? Does your access control have a WOW factor?

Gallagher is releasing new features constantly.

Does your access control have a WOW factor?There are some new features that we haven’t been able to use yet, but look great. The first is a VoIP/SIP server. Without getting too technical, most IP intercoms now are basically IP phones installed next to a door. Each have basic capabilities to call another IP phone. The Gallagher implementation offers the ability to answer intercoms, directly through the Gallagher app. While this won’t replace full integration of intercom systems, it will start to replace intercom integration where the end-user only needs a few intercoms.

The next new feature is a client web application, this new application allows users to connect with Gallagher over a web interface, rather than the full client or mobile app.

If you want to know more about how you and your company can take advantage of these WOW factors, give us a call!