Behind the Scenes at Kenton Brothers: The Power of Our Remote Teams

By Anna Strickland, Intern at Kenton Brothers

The Power of Our Remote TeamsAt Kenton Brothers, keeping the customer safe does not always require a technician to be on site. Our Remote Install Group (RIG) and Remote Services Group (RSG) are dedicated to delivering fast and reliable security solutions without leaving their desks. Team members work behind the scenes to ensure that systems are installed and maintained properly to keep customers safe.

RIG: Setting Systems Up for Success

The Remote Install Group is responsible for making new security systems and upgrading ones already in use. Their main goal is to tailor these systems to the customer’s exact needs.

What RIG Does:

  • System Programming and Configuration: They can remotely program various types of security components.
  • Testing and Verification: Before a system goes live, they confirm functionality so the system will operate as designed.
  • Faster Turnovers: Programming remotely makes installation more efficient and convenient for the customer.

RSG: Reliable Ongoing Maintenance

Once a system is installed, the Remote Service Group is available for support when necessary. If it is determined that a technician does not have to go on-site to fix an issue, this group steps in to quickly resolve it.

What RSG Does:

  • Troubleshooting and Diagnostics: Identifying and solving system issues such as device and sensor errors.
  • System Adjustments: Upgrading licenses and training as well as regular check-ups.
  • Customer Support: Directly working with customers to answer any questions and guide them through their systems.

Working Together for the Best Outcome

Both kinds of service are necessary for the best security. Every step of the way, they are supporting technicians and customers throughout the security process. Kenton Brothers’ remote service groups deliver smarter and more reliable security from the time of set-up and through long-term maintenance. Their expertise allows us to respond quickly and meet our service standards.

To learn more about how RIG and RSG could benefit your company, give us a call!

Solar-Powered Safety: How a Midwestern University Elevated Campus Security with a Vorp Energy Mobile Surveillance Trailer

Solar-Powered Safety: How a Midwestern University Elevated Campus Security with a Vorp Energy Mobile Surveillance Trailer

By Gina Stuelke, CEO of Kenton Brothers

At Kenton Brothers Systems for Security, we’re passionate about protecting people, property, and possessions — and that mission often takes us beyond traditional building systems. Recently, we partnered with Vorp Energy, a forward-thinking manufacturer from Idaho, to deploy a mobile solar-powered surveillance trailer that’s transforming campus safety for a Midwestern university.

A Smarter, More Flexible Approach to Campus Safety

Like many universities, our client faced challenges keeping high-traffic areas — such as parking lots for tail-gating, athletic fields, and event zones — secure around the clock. Fixed camera systems weren’t always practical due to distance from power and data infrastructure. That’s where Vorp Energy’s mobile surveillance trailer came in.

Equipped with solar panels, battery storage, and autonomous power management, the trailer provides a sustainable and mobile security solution that can be deployed anywhere on campus within minutes. It delivers real-time visibility without the need for trenching, cabling, or permanent construction — saving both time and cost.

Solar-Powered Safety: How a Midwestern University Elevated Campus Security with a Vorp Energy Mobile Surveillance Trailer Solar-Powered Safety: How a Midwestern University Elevated Campus Security with a Vorp Energy Mobile Surveillance Trailer

The Kenton Brothers Integration

Our role was to take this mobile platform and make it an intelligent part of the university’s digital security ecosystem. Kenton Brothers supplied and integrated:

  • High-definition digital cameras with advanced analytics
  • Secure networking gear to connect the trailer seamlessly to the university’s central monitoring system
  • Remote access capabilities, allowing campus security staff to view live video and receive alerts from any location

The result is a fully connected, solar-powered security asset that enhances situational awareness, even in off-grid or temporary environments.

Sustainability Meets Security

Beyond the obvious security benefits, this solution aligns with the university’s commitment to sustainability. The solar array keeps the system running continuously, day and night, without relying on fossil fuels or external power sources. It’s an ideal example of how modern security solutions can also support environmental responsibility.

Solar-Powered Safety: How a Midwestern University Elevated Campus Security with a Vorp Energy Mobile Surveillance Trailer Solar-Powered Safety: How a Midwestern University Elevated Campus Security with a Vorp Energy Mobile Surveillance Trailer

Safety that Moves with You

Since its deployment, the mobile surveillance trailer has already proven its value — offering flexible coverage for large public gatherings, sporting events, and construction zones. Whether it’s deterring potential incidents or providing vital evidence after one occurs, the system ensures that campus safety doesn’t have blind spots.

At Kenton Brothers Systems for Security, we’re proud to partner with innovative manufacturers like Vorp Energy to deliver creative, reliable, and sustainable security solutions. Together, we’re redefining what’s possible in campus protection — one solar-powered system at a time.

Interested in learning more about mobile surveillance solutions for your organization? Contact us for a custom demo.

Locked Down: How Kenton Brothers Protects the World’s Most Sensitive Bio Labs

Locked Down: How Kenton Brothers Protects the World’s Most Sensitive Bio LabsBy David Strickland, COO of Kenton Brothers

When your facility houses some of the most dangerous pathogens on Earth, “good security” isn’t enough. It has to be flawless. At Kenton Brothers Systems for Security, we design and integrate multi-layered defense systems for biosafety level 3 (BSL-3) and level 4 (BSL-4) laboratories—environments so secure they’ve been called “prisons for pathogens.”

These are not metaphors. In these labs, every door, every badge reader, every airlock, and every human step is part of a tightly choreographed plan to protect people, property, and the public.

Multi-Layered Defense: The Fortress Within

High-containment labs demand more than barriers—they demand logic. Our security architecture mirrors the same redundant, fail-safe philosophy found in federal and state biosafety regulations (CDC/NIH BMBL, Select Agent Program, and NIH DRM standards).

We engineer defense in depth, including:

  • Perimeter control: Hardened access points, high-security locks, and biometric or multi-factor authentication.
  • Zoned containment: Security levels increase as personnel move closer to pathogen areas, with interlocked doors and pressure-controlled airlocks.
  • Integrated logic: Our systems communicate with building automation to prevent unsafe entry during air or power anomalies.
  • Redundancy everywhere: Backup power, dual networks, and redundant sensors ensure that nothing fails when it matters most.

This approach creates a living fortress—always secure, never stagnant.

Trained and Trusted Personnel

Technology is only as reliable as the people behind it. Every Kenton Brothers technician and project manager who enters a high-containment environment is vetted, trained, and briefed on biosafety principles.  We align our practices with Select Agent Regulations (42 CFR Part 73) and OSHA’s Bloodborne Pathogens Standard, ensuring our teams understand both the engineering and human safety sides of containment work.

Our specialists are drilled in:

  • Door interlock logic and pressure sequence validation
  • Emergency power and lockdown procedures
  • Secure credentialing and audit requirements
  • Integrated testing with mechanical and life-safety systems

In these labs, there is no margin for human error—and we treat it that way.

Locked Down: How Kenton Brothers Protects the World’s Most Sensitive Bio Labs

One Command Center, One Pane of Glass

Managing hundreds of sensors, controllers, and HVAC interfaces across a containment facility can overwhelm traditional systems. That’s why we design and install unified command environments with single plane of glass dashboards that visualize:

  • Door states and interlocks
  • Pressure differentials and HVAC status
  • Camera feeds and alarm conditions
  • Access events and audit trails

This “one-pane-of-glass” view allows facility teams to see, control, and verify their entire environment instantly. When seconds matter, clarity saves lives.

Seamless Upgrades, Zero Downtime

High-containment labs can’t afford outages. Our proprietary transition process allows us to modernize and take over legacy systems while they remain operational. Using shadow controllers, parallel databases, and staged commissioning, we keep containment intact while bringing systems up to today’s standards.

The result? Continuous security, continuous science.

Built to Meet and Exceed Federal Standards

Every design we deliver aligns with or exceeds:

  • CDC/NIH Biosafety in Microbiological and Biomedical Laboratories (BMBL, 6th Edition)
  • NIH Design Requirements Manual (DRM)
  • Federal Select Agent Program (FSAP)
  • ASHRAE laboratory ventilation guidance
  • UL 294 for access control equipment performance

These aren’t boxes we check—they’re the foundation of our design philosophy.

Protecting People, Science, and the Public

At Kenton Brothers, we believe that security and science share the same mission: protect life.
Our systems safeguard the researchers who push the boundaries of medicine and the communities who depend on their breakthroughs.

In a environment where the stakes couldn’t be higher, we bring together trained people, proven processes, and hardened technology to ensure that what’s inside those walls stays inside and that those who work there come home safely every day.

Because when it comes to pathogen containment, there’s no second chance.

The Spooktacular Truth About Batman Tech: What’s Real and What’s Just Hollywood Magic

The Spooktacular Truth About Batman TechBy David Strickland, COO of Kenton Brothers

Every October, when I wander through Sam’s Club or Target, I can’t help but grin. The candy aisles are overflowing, kids are running around in superhero capes, and somewhere between the Reese’s and the fog machines, there it is, the wall of Batman costumes.

Halloween night brings out dozens of little caped crusaders tugging on plastic cowls while parents smile behind their phones. That sight always makes me think the same thing:

“You know, some of Batman’s gadgets aren’t that far-fetched anymore… and some are still pure Hollywood.”

After almost two decades in the physical security industry, I’ve watched the line between comic-book tech and real-world systems blur. At Kenton Brothers Systems for Security, we see it firsthand every day. Our team designs, installs, and maintains systems that once belonged in superhero movies.  From cameras that see in total darkness to command centers that unify hundreds of devices across cities and campuses.

So, this Halloween season, let’s have a little fun. Let’s pull back the cape and look at where Batman tech has actually become reality… and where the movies are still stretching the truth.

10 Ways Batman Tech Is Already Real (or Getting There Fast)

1) The Bat-Tracker — GPS and Asset Tracking

Batman slaps magnetic trackers on getaway cars.
We do that every day! GPS tracking for vehicles, shipments, and field teams is standard in modern security operations. At Kenton Brothers, we use similar tech to monitor service fleets, protect high-value assets, and keep clients connected in real time.

2) The Bat-Eye — Thermal and FLIR Imaging

Batman’s blue-and-orange heat vision looks cinematic, but it’s real.
FLIR (Forward-Looking Infrared) cameras detect heat signatures in total darkness, and we deploy them to safeguard perimeters, utility sites, and research facilities where visibility is critical.

3) The Batcave: Integrated Security Command Centers

The Spooktacular Truth About Batman TechBruce Wayne’s wall of glowing monitors?
That’s our world. Our clients — from schools to corporate campuses — rely on integrated video walls and command centers by Gallagher Command Center, Genetec Security Center and Milestone XProtect to manage doors, alarms, and live video from one sleek interface. (Think Batcave… without the guano.)

4) The Bat-Comm: Encrypted Communication

Batman and Alfred used secure lines.
We do too. Encrypted radios, secure VPNs, and cloud-based collaboration tools keep our field technicians, command centers, and clients linked safely and privately.

5) The Bat-Drones: Aerial Surveillance

Remember the Batwing?
Today’s drones give real security pros eyes in the sky. Kenton Brothers integrates thermal-equipped UAVs for facility inspections, large events, and tactical perimeter sweeps.

6) The Bat-Suit: Body Armor

Modern Kevlar and ceramic armor are life-saving innovations.
While Batman’s suit might be bulletproof and explosion-proof, ours are designed for real protection, flexibility, and mobility, used daily by law enforcement and special response teams we support.

7) The Bat-Cam Network: Citywide Surveillance

In The Dark Knight, Batman taps into every camera in Gotham.
That’s closer to reality than you might think. Cities like Chicago and London already run massive, integrated camera systems — and at Kenton Brothers, we’re helping build similar secure networks for private enterprises and municipalities.

8) The Utility Belt: Non-Lethal Defense Tools

Smoke bombs and knockout gas? Not quite — but OC spray, pepper gel, and tasers fill that role.
Today’s security professionals use advanced, non-lethal tools designed for safety and control — not chaos.

9) The Batmobile’s Sensors: Collision and Perimeter Detection

Batman’s car “feels” danger before it hits.
Our access control and intrusion systems do the same, using radar, LiDAR, and analytics to detect threats before they breach a perimeter.

10) The Bat-Computer : AI and Data Fusion

Batman’s computer could cross-reference clues in seconds.
At Kenton Brothers, we’re doing the same thing (minus the gravelly voice). Our AI-driven analytics combine access, video, and alarms into a single, intelligent platform that helps teams respond faster and smarter.

10 Batman Myths That Still Belong in Hollywood

  1. “Zoom and Enhance!”:  Sorry, CSI fans. A 240p image won’t become 4K with a few clicks.
  2. Instant Forensics: DNA and fingerprints take hours or days, not seconds.
  3. City-Wide Real-Time Face Tracking: Possible, but heavily limited by lighting, clarity, and privacy laws.
  4. EMP Weapons: Real in military labs, but they’d knock everything offline.
  5. Instant Hacking: Even with access, secure integrations take serious setup.
  6. Perfect Predictive Policing: AI highlights anomalies; humans interpret them.
  7. Grappling Hook Launchers: Cool, but still clunky and unsafe in real life.
  8. Indestructible Armor: Real armor stops bullets, not explosions.
  9. Unlimited Power: Every gadget needs power, backups, and maintenance — that’s why we design redundant systems.
  10. Lag-Free AI Control: We’re close, but physics and bandwidth still win some battles.

Why This Matters — and Why I Love This Season

Halloween reminds us of imagination — of believing we can become something extraordinary, even if just for a night. That’s what I see in every Batman costume on those shelves: the spark of wanting to protect, to lead, to make a difference.

At Kenton Brothers Systems for Security, that’s exactly what we do — every single day. We help protect schools, government buildings, healthcare facilities, and businesses with layered security systems designed to anticipate, detect, and respond. We don’t have capes, but we have conviction, technology, and a century of experience keeping people safe.

So this October, as you see those mini Batmen and Batwomen racing around your neighborhood,  smile. Because the Batcave isn’t fiction anymore. It’s being built all around us by the men and women of the modern security industry, one secure system at a time.

About Kenton Brothers Systems for Security

For over 125 years, Kenton Brothers Systems for Security has helped organizations protect what matters most. From access control and surveillance to integrated command centers and intrusion detection, our mission is simple:
Protect People, Property, and Possessions with Integrity and Innovation.

Because in the real world, you don’t need to be Batman to feel secure. You just need the right partner.

Disclaimer: Educational and Editorial Content

Batman and all related characters and elements are trademarks of and © DC Comics. This blog is not affiliated with, endorsed by, or sponsored by DC Comics, Warner Bros. Entertainment, or any of their parent companies.

This content is for educational and informational purposes only. Our blog uses popular culture, including fictional characters like Batman, to explore and discuss real-world topics related to the security industry and the public technologies available today. The views and analysis presented here are the opinions of the author and are intended for commentary and critique under the doctrine of fair use.

The Hidden Risks of Offsite Video Storage: What Schools and Enterprises Must Know

By David Strickland, COO of Kenton Brothers

The Hidden Risks of Offsite Video StorageLarge organizations—schools, universities, hospitals, and government facilities depend on surveillance to protect people, property, and critical operations. With hundreds or thousands of cameras running 24/7, the sheer volume of video data is enormous. To cope, many institutions turn to offsite third-party storage providers or cloud-based VMS platforms like Genetec, Milestone, or cloud-native solutions such as Verkada.

On the surface, it sounds simple: stream footage to the cloud, save space, and access video from anywhere. But the truth is, unless the system is engineered properly, organizations risk skipped frames, corrupted recordings, compliance failures, and even catastrophic evidence loss.

This guide breaks down the pitfalls and the critical technical considerations, from camera settings to network design to compliance, that must be addressed to keep surveillance video reliable and secure.

1) Camera Settings: The Hidden Multiplier on Your Network

The first choke point in your pipeline is the camera itself. The way cameras are configured has a massive impact on both the network and storage infrastructure.

Frames Per Second (FPS):
10–15 FPS is often sufficient for general monitoring. 30 FPS (or higher) may be required for forensic or evidentiary use but triples the bandwidth demand.

Resolution:
Standard 1080p produces a manageable data rate. 4K and above exponentially increase throughput, often 4–6x more per stream.

Compression (H.264 vs H.265):
H.265 significantly reduces bandwidth but requires more processing power at both the camera and server level.

Infrared/Night Vision:
Cameras that switch to IR mode at night often generate more noise and higher bitrates, increasing data load during nighttime recording, exactly when fewer IT staff are on hand to notice bottlenecks.

Forensic Capture Mode:
When enabled, forensic capture retains maximum detail for investigative playback. The tradeoff: higher bitrates, larger file sizes, and more stress on the uplink pipeline.

Analytics-Enabled Cameras:
Features like motion detection, license plate recognition, or facial analytics also increase data intensity because raw video plus metadata must be transmitted and stored.

Bottom line: Camera configuration is not just an image quality choice—it dictates the size of your network pipe and storage footprint.

2) The Network Pipeline: Purpose-Built for Video

With camera settings increasing demand, your network must be designed to handle peak throughput—not just average load.

  • Dedicated Video Network: Surveillance traffic must never share space with operations or academic IT networks. Either create a true physical air gap or, at minimum, a VLAN gap with strict firewall policies.
  • Uplink Sizing: Bandwidth must account for worst-case scenarios , like all forensic-mode cameras streaming simultaneously during an event.
  • Latency & Packet Loss: Dropped packets = lost evidence. Enterprise switches and routers should prioritize video with QoS and enforce jitter control.

3) Continuous Network Health Monitoring

Video networks must be proactively managed. A reactive “call when something breaks” model is not enough.

  • 24/7 Monitoring Tools: SNMP, NetFlow, or specialized VMS health dashboards should track bandwidth, packet loss, jitter, and CPU loads.
  • Automated Alerts: Threshold-based notifications should trigger when bitrates spike (e.g., IR cameras at night) or when uplink saturation nears 80%.
  • Redundant Circuits: Fiber cuts and ISP outages should not compromise your video evidence. Always design for failover and redundancy.
  • Specialized Services: Platforms like AI Argus and Viakoo are built specifically for video assurance.
    • AI Argus uses artificial intelligence to monitor not just network performance but also camera behavior, recording integrity, and retention compliance. It catches anomalies such as IR-mode bitrate spikes or forensic capture loads before they become problems.
    • Viakoo provides end-to-end monitoring and automated compliance reporting, ensuring every camera is recording properly and retention policies are met. It offers system health dashboards and root cause analysis tailored to large enterprise environments.

These tools move monitoring beyond IT basics, they guarantee your video evidence remains reliable and legally defensible.

4) Virtual Servers and Cloud Security

When footage moves offsite, the virtual environment storing and managing it must be hardened.

  • High Availability Clusters: Redundant hypervisors and automated failover keep VMS services online.
  • Encryption: All video must be protected in transit (TLS 1.2+) and at rest (AES-256).
  • Patch Cycles: Hypervisors, OS layers, and VMS software must follow a regular, documented update schedule.
  • Segmentation: Video servers must not touch production or academic workloads. Segregation is your firewall against cascading breaches.

5) Compliance and Retention

Schools and universities face legal frameworks like FERPA, HIPAA, CJIS, and state laws—all of which dictate how surveillance data must be retained and protected.

  • Retention Audits: Your storage provider must prove compliance with clear, auditable retention logs.
  • Immutable Storage: For legal or evidentiary needs, write-once/read-many storage ensures footage cannot be altered or deleted.
  • Chain of Custody: Documentation from camera to cloud must be verifiable for footage to be admissible in court.

6) Point-to-Point: Hardening the Entire Path

To trust your video evidence, each step of the pipeline must be engineered for reliability:

  1. Camera Settings – FPS, resolution, compression, IR modes, forensic capture tuned appropriately.
  2. Edge Switches – Managed with QoS to prioritize video, isolated VLANs.
  3. Core Network – Redundant switches/routers with firewall separation from IT systems.
  4. Uplink – Redundant circuits sized for peak video demand.
  5. Ingress to Third-Party Provider – Secured through private VPNs or direct fiber; never open internet.
  6. Virtual Server Layer – Redundant, encrypted, patched, segmented from other workloads.
  7. Cloud Storage – Multi-site replication, integrity checks, immutable retention options.
  8. Monitoring – Continuous health monitoring via AI Argus, Viakoo, and real-time IT dashboards.
  9. Audit Reporting – Quarterly or annual compliance checks to validate nothing is slipping through the cracks.

Why This Matters

The camera settings you choose directly influence the survival of your evidence. A 30 FPS forensic camera in infrared mode can generate 10x the data of a 10 FPS daytime camera,  crushing an undersized network or poorly configured cloud pipeline.

Without continuous monitoring, you may never know your system is failing until the moment you need that footage and it’s gone.

Enterprise video surveillance is no longer just “plug in cameras and hit record.” It’s a carefully engineered ecosystem that spans camera configuration, network infrastructure, cloud storage, compliance frameworks, and continuous monitoring.

Whether you’re using Genetec, Milestone, or cloud-native systems like Verkada, you must design with the camera-to-cloud lifecycle in mind: size your pipeline for worst-case demand, monitor continuously with tools like AI Argus and Viakoo, enforce network segmentation, and validate compliance regularly.

At Kenton Brothers Systems for Security, we specialize in building surveillance infrastructures that hold up under real-world pressure—because protecting people, property, and possessions depends on more than cameras. It depends on trusting that your video will be there when you need it most. If you need help making sure that is the case, give us a call.