Sustainability in Security: 5 Eco-Friendly Solutions to secure your people, property and possessions.

By Gina Stuelke, CEO of Kenton Brothers

Sustainability in SecurityAs the global push for sustainability continues to grow, the physical security industry is embracing green innovations to balance robust protection with environmental responsibility. Here’s a look at how eco-friendly solutions are reshaping security practices:

Solar-Powered Security Systems

The Innovation: Solar-powered surveillance cameras, motion detectors, and perimeter lights are becoming increasingly popular for off-grid locations or areas looking to reduce energy consumption.

Benefits:

  • Reduces reliance on electricity grids, lowering operational costs.
  • Offers consistent functionality in remote areas.
  • Minimizes carbon footprints associated with traditional wired systems.

Example: Solar-powered video surveillance systems equipped with energy-efficient batteries can operate continuously, even in low-light conditions.

Energy-Efficient Hardware

The Innovation: Modern security equipment, such as LED-powered floodlights, low-power sensors, and energy-saving access control systems, are designed to consume less energy. Replacing traditional lighting with LED solutions in surveillance systems significantly reduces energy usage. LED lights offer longer lifespans and lower maintenance costs, aligning with eco-friendly objectives.

Benefits:

  • Lower utility bills and reduced environmental impact.
  • Extended lifespan of equipment due to advanced energy management.

Example: Smart lighting systems that activate only when motion is detected, significantly cutting down unnecessary energy use.

Biodegradable and Recyclable Materials

The Innovation: Security products such as fencing, bollards, and barriers are now being made from biodegradable or recyclable materials without compromising durability.

Benefits:

  • Reduces waste during replacements or upgrades.
  • Promotes circular economy practices in the security sector.

Example: Barriers made from recycled plastics or biodegradable composites that offer the same strength as traditional materials.

Remote Monitoring to Reduce Travel Emissions

The Innovation: Cloud-based security systems enable remote monitoring and management, reducing the need for on-site visits by security personnel.

Benefits:

  • Reduces travel-related emissions.
  • Enhances efficiency with real-time alerts and centralized control.

Example: Security firms offering remote patrol services via drones or AI-driven surveillance systems.

Green Building Certifications for Security Integration

The Innovation: Incorporating eco-friendly security solutions into buildings aiming for LEED (Leadership in Energy and Environmental Design) or similar certifications. A 2023 survey revealed that nearly 23% of physical security professionals anticipate manufacturers will adopt green practices to add value or differentiate themselves. Additionally, around 22% expect stricter government regulations to promote sustainability and advancements in technology making greener products more accessible.

Benefits:

  • Aligns security measures with sustainable architecture goals.
  • Increases property value and appeal for environmentally conscious stakeholders.

Example: Installing smart locks, renewable-powered security gates, and energy-efficient HVAC-integrated monitoring systems in green-certified buildings.

Challenges and Solutions

While eco-friendly security systems offer numerous benefits, challenges such as higher upfront costs, limited technology awareness, and the need for specialized maintenance can hinder adoption.

Solutions:

  • Government incentives and tax breaks for sustainable infrastructure.
  • Partnerships between security firms and green technology companies.
  • Educating businesses on the long-term cost and environmental benefits of green security alternatives.

Adopting sustainable security solutions is no longer just an ethical choice but a business imperative in today’s eco-conscious world. By integrating green innovations, the physical security industry can contribute to environmental preservation while maintaining high standards of safety and protection.

Not sure where to begin? Give us a call.

Facial Authentication vs. Facial Recognition: Understanding the Differences and Applications

By Gina Stuelke, CEO of Kenton Brothers

Facial Authentication vs. Facial RecognitionBiometric technologies have gained immense popularity for their convenience and enhanced security. Among these technologies, facial authentication and facial recognition stand out as two of the most discussed and applied innovations. While the terms are often used interchangeably, they refer to distinct processes and serve different purposes.

In this blog post, we’ll break down the differences between facial authentication and facial recognition, their underlying technology, and their real-world applications.

What is Facial Authentication?

Facial authentication is a biometric verification process where a system compares the face of a user to a pre-stored image (or template) to confirm their identity. This technology is primarily used in situations where a user must prove they are who they claim to be, such as when unlocking a smartphone, accessing a secure area, or logging into a banking app.

How it Works:

  1. Enrollment: The user enrolls their face into the system by scanning it, typically with a camera. This creates a template, which is a mathematical model of the facial features.
  2. Comparison: When the user attempts to access the system again, their face is scanned in real-time and compared to the stored template.
  3. Matching: If the live scan and stored template match within a certain threshold, the user is authenticated.

Key Features:

  • One-to-One Comparison: It compares a user’s face against their own stored template, confirming their identity.
  • Security: It is typically used in secure environments where users need to prove their identity (e.g., smartphones, banking apps).
  • User Control: Users usually initiate the process and consent to the comparison.
  • Common Applications:
    • Smartphone unlocking (e.g., Apple’s Face ID)
    • Secure access to apps and services (e.g., banking apps)
    • Physical security systems (e.g., building access)

What is Facial Recognition?

Facial recognition is a broader technology used to identify or verify a person from an image or video in a database or a public setting. Unlike facial authentication, facial recognition often works without the active involvement or consent of the individual and can be used in surveillance or identification tasks.

How it Works:

  1. Image Capture: A camera or video feed captures the face of a person in real-time or from a photograph.
  2. Feature Extraction: The system extracts facial features from the image and creates a biometric template.
  3. Database Search: The system compares the facial features to those in a large database to find a match.
  4. Identification or Verification: If a match is found, the person is identified or their identity is verified. If no match is found, they remain unidentified.

Key Features:

  • One-to-Many Comparison: Facial recognition systems compare a person’s face against many stored templates in a database.
  • Surveillance and Public Use: It’s often used in public spaces for surveillance, identifying individuals without their active participation.
  • Privacy Concerns: Since individuals may not know when their face is being scanned, the technology has raised privacy and ethical concerns.
  • Common Applications:
    • Law enforcement and criminal identification
    • Airport security and border control
    • Retail and commercial surveillance
    • Marketing and customer analytics (e.g., identifying returning customers)

Key Differences Between Facial Authentication and Facial Recognition

Facial Authentication

Purpose: To verify an individual’s identity
Comparison Type: One-to-one comparison (individual vs. stored template)
User involvement: Requires user participation
Security vs. Convenience: Primarily for security (e.g. unlocking devices)
Privacy concerns: Lower (user initiates the scam)
Common User Cases: Smartphone authentication, banking apps Law enforcement, public surveillance, marketing

Facial Recognition

Purpose: To identify or recognize individuals in a crowd
Comparison Type: One to many comparison (individual vs. database)
User involvement: Can be passive and without user consent
Security vs. Convenience: Primarily for identification tracking
Privacy concerns: Higher (can be used without user consent)
Common User Cases: Law enforcement, public surveillance, marketing

Privacy and Ethical Considerations

While both technologies offer undeniable benefits, they raise important privacy concerns, particularly facial recognition. Since facial recognition can be used without the knowledge or consent of the individual, it poses potential risks related to surveillance and the tracking of individuals in public spaces. Many governments and organizations are still working to strike a balance between the benefits of these technologies and the protection of individual privacy. On the other hand, facial authentication, which requires user consent and involvement, is generally considered less invasive, as it is used for secure access to personal devices or services.

Facial authentication and facial recognition are two powerful biometric technologies with distinct purposes and applications. Facial authentication is typically used to verify a user’s identity for security purposes, while facial recognition is used to identify individuals from a crowd or a database. Understanding these differences is crucial, especially as both technologies continue to evolve and become more integrated into our daily lives.

Whether you’re concerned about privacy, security, or convenience, it’s essential to stay informed about how these technologies are being used and regulated. We are here to guide you, give us a call.

Unlocking the Future: What’s next in commercial security?

By Gina Stuelke, CEO of Kenton Brothers

What’s next in commercial security?Over the last decade, we’ve experienced two major types of convergence: Physical security and IP networks, and then came Physical security and Cyber security.

The next major convergence in commercial security technology is likely to involve unified AI-driven platforms that seamlessly integrate cybersecurity, physical security, and IoT (Internet of Things) systems.

This would bring together several trends and advancements:

1. AI-Powered Threat Detection and Response

  • Predictive Security: AI models capable of forecasting potential breaches or attacks based on behavioral analytics. This goes beyond reactive measures, using machine learning to detect anomalies before an event occurs.
  • Autonomous Systems: Drones, robotic surveillance, and even autonomous security guards controlled by AI could patrol areas, responding to security incidents in real time without human intervention.

2. Cyber-Physical Fusion

  • The lines between cybersecurity and physical security will blur further. IoT devices (e.g., smart cameras, connected door locks) will not only detect physical breaches but also monitor network vulnerabilities. This creates a multi-layered defense against both digital and physical threats, closing gaps between the two domains.
  • Zero Trust Architecture: Every device or person accessing a system will need continuous verification, whether for physical entry or access to sensitive digital resources, reducing potential attack vectors.

3. Blockchain for Secure Authentication

  • Blockchain technology could revolutionize identity management, ensuring tamper-proof access control across various systems. It will allow for decentralized, secure authentication for all connected devices and users, ensuring data integrity and eliminating single points of failure.

4. Edge Computing for Faster, Localized Response

  • Instead of relying on the cloud, edge computing will allow security devices to process data locally for faster threat response. For example, a surveillance camera would be able to identify a security risk and trigger an alert immediately, without needing cloud processing.

5. Biometric and Behavioral Authentication

  • Beyond facial recognition, systems will start analyzing biometric and behavioral traits in real-time. This could include gait analysis, heart rate, or even brainwave patterns for security clearance, adding another layer of complexity and accuracy in authentication.

6. Cloud-Native Security Systems

  • The shift to cloud-native security infrastructures will continue, offering scalable and flexible solutions. Centralized AI will analyze and manage security systems across multiple physical locations, with a focus on real-time, remote management.

7. Quantum-Resistant Cryptography

  • With the advent of quantum computing, traditional cryptographic systems will become vulnerable. The next convergence will likely involve quantum-resistant encryption to protect sensitive data and communication channels in both digital and physical security networks.

8. Human-AI Collaboration in Security

  • Rather than replacing human security professionals, AI will act as an augmentation tool. AI systems will flag threats and provide suggestions, while humans maintain decision-making roles in high-stakes scenarios.

9. Augmented Reality (AR) in Security Operations

  • AR-enhanced interfaces will be used by security professionals for real-time threat visualization, allowing them to view live data, camera feeds, and analytics through wearable devices like AR glasses, streamlining responses during security breaches.

10. Privacy-Enhancing Technologies

  • As surveillance expands, privacy-preserving technologies (such as homomorphic encryption or differential privacy) will grow in importance to balance security needs with individual privacy concerns, ensuring that security doesn’t compromise personal data rights.

This convergence would result in unified, intelligent, and proactive security ecosystems that can address an increasingly sophisticated range of threats, blending the digital and physical worlds with advanced AI and decentralized technologies. If you could use help navigating the always changing landscape of commercial security, give us a call. We are here for you.

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.

By Gina Stuelke, CEO of Kenton Brothers 

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.In line with our core values of continuous learning, innovation and customer focus, as a physical security integrator, Kenton Brothers is increasingly leveraging AI technology to enhance security operations, improve efficiency, and deliver advanced solutions to our clients.

Here’s how we’re putting AI to work:

1) AI-Powered Video Surveillance

  • Intelligent Video Analytics: AI algorithms can analyze video feeds in real-time to detect suspicious behaviors, unauthorized access, or potential threats. For example, AI can identify intruders, recognize objects (such as weapons), and track movements.
  • Facial Recognition: AI enables automated identification of individuals based on facial features, allowing for efficient access control and security checks.
  • Behavioral Analysis: AI can detect abnormal behaviors, such as loitering, aggressive movements, or unauthorized gatherings, alerting security personnel to potential risks.

2) Predictive Maintenance and Monitoring

  • Proactive System Maintenance: AI-driven analytics help predict when security equipment (such as cameras or alarms) might fail, enabling integrators to schedule maintenance before malfunctions occur. This reduces downtime and enhances system reliability.
  • Monitoring IoT Devices: AI helps manage and monitor IoT-connected security systems, ensuring these devices remain secure and functional.

3) Access Control and Authentication

  • Biometric Authentication: AI is used for facial recognition, fingerprint scanning, and iris detection, ensuring only authorized personnel can access secured areas. AI enhances accuracy by learning and improving identification over time.
  • Behavioral Biometrics: AI systems can analyze users’ behavioral patterns (such as typing speed or gait) to authenticate users dynamically, adding another layer of security beyond traditional credentials.

4) Cybersecurity and Threat Detection

  • AI for Intrusion Detection: AI helps monitor digital networks tied to physical security systems, identifying potential cyber threats such as hacking attempts or malware. Physical security integrators use AI to strengthen the digital defenses of connected security devices, preventing breaches.
  • Anomaly Detection: AI can flag abnormal behaviors in security networks, such as unexpected traffic patterns or unauthorized access attempts, allowing integrators to address cybersecurity vulnerabilities before they lead to physical security breaches.

5) Automation of Security Tasks

  • Automated Monitoring and Reporting: AI automates routine security tasks like monitoring large-scale environments or compiling daily security reports. This allows human operators to focus on more complex tasks.
  • Drones and Robotics: AI-powered drones and robots are being deployed to patrol large areas autonomously, monitoring for security risks, and reporting anomalies back to a central system.

6) Improved Incident Response

  • AI-Powered Threat Response: When AI detects a security breach or potential risk, it can trigger automated responses like locking doors, alerting security personnel, or deploying drones. AI systems can prioritize incidents based on severity, ensuring that the most urgent issues are addressed first.
  • Integrated Security Systems: AI helps integrate various security systems (video surveillance, access control, alarms) into one platform, providing a holistic view of security events and streamlining incident response.

7) Data-Driven Insights

  • Enhanced Decision-Making: AI helps physical security integrators analyze vast amounts of data from multiple sources (cameras, sensors, access logs) to provide actionable insights. This can include identifying vulnerabilities, optimizing security layouts, or predicting future threats.
  • Heat Mapping: AI can create heat maps of physical spaces based on foot traffic patterns. Clients can use these insights to improve security placement and better understand how spaces are being used.

8) Real-Time Alerts and Notifications

  • Smart Alerts: AI systems can provide real-time notifications to security teams based on detected risks or rule violations. Alerts are more precise, reducing false positives and allowing security teams to respond quickly and efficiently.

9) AI-Driven Command Centers

  • Centralized Management with AI: AI is used to streamline the operations of command centers where multiple security feeds are monitored. AI processes data and can escalate incidents automatically, helping integrators improve response times.
  • Virtual Assistants for Command Centers: AI chatbots or virtual assistants can help operators by providing quick access to relevant information, issuing commands, or managing routine tasks like activating or deactivating systems.

10) Cost Efficiency and Scalability

  • Optimized Resource Allocation: AI allows integrators to optimize the placement and use of security personnel. For example, it can flag areas of concern, allowing security officers to focus on specific zones rather than patrolling areas that don’t need attention.
  • Scalability: AI-driven systems are more scalable than traditional security setups. As security needs grow, AI can manage and analyze larger datasets without a proportional increase in manpower, making security operations more cost-efficient.

Artificial Intelligence is transforming physical security by automating and enhancing traditional  security processes, improving threat detection, and enabling smarter, more proactive security solutions. Kenton Brothers is able to offer more advanced and efficient systems that better protect assets and people while reducing costs and human labor.

If you are ready to take advantage of all that AI is bringing to commercial security, please give us a call. Let’s work together to create solutions to your security concerns!

From Legacy to Leading Edge: A visual journey through the evolution of security technology

From Legacy to Leading EdgeBy Gina Stuelke, CEO of Kenton Brothers

Back in 2008, our industry experienced a significant convergence event joining physical security and IP based networks onto a common platform. This was a major shift away from the disparate systems we had become accustomed to. That seems like such a long time ago! Today, we are involved in another convergence event involving physical security and cyber security.

The two pyramids in the images below represent the technology stacks used by Kenton Brothers, with each layer reflecting the progression of security technologies and how our offerings have elevated over time.

Kenton Brothers 2008 Technology Pyramid

Kenton Brothers Systems for Security: Pyramid1. Base Layer (Mechanical Locking Hardware): Traditional, physical locking systems.
2. High Security Cylinders and Masterkey System Implementation: The introduction of advanced physical keys and locks.
3. Legacy and Stand-Alone Access Control and Analog Video Surveillance Systems: Initial electronic security measures, such as standalone access systems, video surveillance and analog technologies.
4. Network-Based (IP) Access Control and Video Surveillance Systems: The shift to internet-based systems, improving remote access and integration.
5. Integration Services: Combining different systems (video, access control, etc.) for better coordination and ease of use.
6. Hosted and Managed Services: Outsourcing and cloud-based security management to external providers.
7. Video Analytics: Using software to analyze video data and identify suspicious activities automatically.

Kenton Brothers 2024 Technology Pyramid

Kenton Brothers Technology Pyramid1. Base Layer (Security Policies and Procedures): Security begins with robust organizational policies and procedures, a foundational aspect in modern security systems.
2. High Security Physical Hardware: Continues from previous physical security technologies but is more sophisticated.
3. Detection: Active detection systems for unauthorized access or incidents (includes sensors, alarms, etc.).
4. Access Control: Advances in access control technology (includes biometric and smart credentials).
5. Video Surveillance: Video monitoring remains central, but with higher resolution, better storage, and cloud integration.
6. Analytics and AI Support: Modern video surveillance includes AI, improving event detection and proactive analysis.
7. Cyber Hardening: Reflects the growing importance of cybersecurity, securing systems from hacking and digital threats.

What are the comparisons in technological advances?

  • Shift from Analog to IP: Over the last decade, analog systems (present in the first pyramid) have largely been replaced by IP-based systems, which allow for higher quality video and easier integration into larger networks.
  • Integration of AI and Analytics: Modern systems (second pyramid) emphasize the use of AI for proactive security management. This shift moves beyond video analytics to AI-supported threat detection, reducing human workload and improving accuracy.
  • Focus on Cybersecurity: The first pyramid lacks any mention of cybersecurity, which has become essential in modern security infrastructures due to the increasing threat of hacking. Cyber hardening in the second pyramid highlights this critical evolution.
  • Increased Use of Cloud Services: The second pyramid also reflects advances in cloud technologies for video storage, processing, and real-time analytics—leading to more flexible, scalable, and manageable systems.
  • Detection Technologies: Detection is more advanced in the second pyramid, likely including smarter sensors and automated systems integrated with AI.

Security systems have evolved from primarily physical and standalone solutions (first pyramid) to highly integrated, AI-driven, and cyber-secure ecosystems (second pyramid). These technological shifts have led to more automated, efficient, and intelligent systems capable of responding to modern-day security threats.

Has your commercial security stack been in place for a long time? It may be time to take a good look to make sure you are keeping up with the aggressive changes in technology. And if you need help, please give us a call!