“Camera in a Box” Solution for Community Improvement Districts

By Neal Bellamy, IT Director at Kenton Brothers

"Camera in a Box" Solution for Community Improvement DistrictsThe use of cameras to help protect areas of the city has never been more prevalent than today. The increase in camera quality and capability has increased the effectiveness, while decreasing the number of cameras needed. License plate cameras have also never been more effective. City infrastructure has also given the city capability to transmit the video to central monitoring stations to assist with live issues. (Of course, any city’s funding will only go so far.)

Community Improvement Districts

Community Improvement Districts (CID) are groups of owners in an area that partner with their city government to help improve the economy, safety, beautification, and or capital improvements for its area. Here in Kansas City there are many established CIDs including Downtown and River Market, Crossroads, Main Street, 39th Street, Waldo, Troost, Truman Road and more.

Typically, these CIDs have a better understanding of their areas where safety and security needs are. However, CIDs typically do not have the resources to monitor or respond to their given areas through cameras in the area. This is where a partnership can help both a CID and the local police department.

Infrastructure? Check.

Many light poles have a plug on top to provide power. The network is available through either city infrastructure or 5G cellular connections. (5G is now fast enough to provide video feeds back to central monitoring.) Some cities even have their own local wireless network.

“Camera in a Box” from Kenton Brothers? Check.

"Camera in a Box" Solution for Community Improvement DistrictsThe CID can purchase a Swiss army knife type of solution that can be mounted permanently or temporarily as needed to provide coverage of specific areas. Many different types of cameras can be used such as license plate capture, PTZ, 360 degrees situational, Infrared, etc. Camera analytics have also improved greatly to help alert when specific license plates are found or when there is movement in areas that should not have activity.

The camera boxes that we are providing offer a lightweight, weatherproof (Nema 3R) pole or wall-mounted enclosure, 8 ports for cameras, up to 480 W of POE power, and a 5G/Wifi/Networked router with a plug to interface into the existing light poles. This will provide a solid base to which each location can be customized to the situation.

If a customizable Swiss-army cameras in a box type of solution help you or you local police department, let us know how we can help!

Commercial Safe Drilling Services are a Dying Art. We’ve Got You Covered

By Ryan Kaullen, Field Services Manager at Kenton Brothers

Commercial Safe DrillingSafes are made to keep items secure and for the most part they do a really good job, sometimes too good a job. When safe locks fail, get tampered with, and can’t be unlocked, you have a few options.

One option is having a certified and trained safe professional try to manipulate and open it using a variety of techniques. Second, depending on the type of safe, you can cut the hinges or bolts. And third, you can perform a drilling process. Using the drilling technique can take hours to even days, especially if it is a GSA high security safe.

There are preventative measures you can take to try and help avoid a safe lock from failing:

  • Preventative maintenance. Having a certified professional come on site to perform quarterly or yearly maintenance. They can assess how the safe is operating, provide proper testing, apply proper mechanical lubricants, and advise of any issues before a lock fully fails. Sometimes, locks just fail… but at Kenton Brothers we have seen time and time again preventative maintenance extending the life of the locks. This helps our clients get ahead of any potential issues with their safe(s) which helps financially in the long run.
  • Do not use WD-40 on locks. WD-40 will do more damage to your safe lock than helping it. If you want to apply the right lubricant, please contact Kenton Brothers and we would be happy to sell you the correct products to use on your safe.
  • Use the right locks for the right applications. This is a consistent issue. Our techs go on site and find safe locks that are not the correct rating, or not the right application, for their use requirements. Depending on the nature of your business, or what you are storing in the safe, there are certain requirements from a government level (GSA) that have to be met by law. We are obligated to report these situations when we find them. There are two options to resolve this situation: 1) Provide pricing to bring the safe up to standard or 2) Strip the safe of its certifications and fill out appropriate paperwork.
  • Always keep track of your safe combinations in a safe/secure location. This is an easy way to avoid service calls.
  • Make sure the company you are hiring to work on your safe/safe locks is certified. Your security provider must have experience with safe locks. Just because they are a mechanical locksmith does not mean they are certified to work on safe locks. Unauthorized fixes or attempts to fix can void warranties and cause damage to the equipment.

Commercial Safe Drilling Commercial Safe Drilling Commercial Safe Drilling

A real world story about why this matters.

Recently, we received a service call about a high security safe that was not opening. When our technician arrived on site, he found seven GSA Red Label containers. All seven had the wrong locks on them. (Remember, we are required to report these types of infractions.) We provided our customer with two options: replace all the safe locks or strip them of their certifications. The customer chose to bring one of their safes up to code and strip the rest. This was an expensive process for the customer because we had to drill one of the safes and supply the correct lock, and then do a considerable amount of government related paperwork.

Our customer could have avoided the expense of fixing incorrect locks if they had reached out to a certified GSA company when installing the containers in the first place. We would have advised them on the proper procedures and protocols. They wouldn’t have had to make the decision to decertify six expensive safes. The moral of the story is that hiring certified professionals to work on your safes may be more expensive initially, but in the long run it will be worth the investment!

We have been fortunate to work on safes of every size and level of security.

We have three GSA certified, trained, and continually educated technicians on our team. Let Kenton Brothers be the partner who keeps your safes operating correctly (or allow us to open them when you can’t!)

To schedule service of your safe please give us a call or email service@kentonbrothers.com.

Radio Towers? Yes, We Do That

By Neal Bellamy, IT Director at Kenton Brothers

Radio Towers? Yes, we do that.In today’s episode of “Yes, we can do that”, I bring you Radio Towers. It’s not the first time we have placed equipment on towers, but this time I have pictures!

The Problem:

A municipality approached us with two issues they wanted to solve.

First, they wanted cameras installed in strategic spots around their city, but did not have any network infrastructure to get the signal back to the police station. Second, they wanted to create a security perimeter around the radio tower itself. There was some extra credit available if we could get some long-distance cameras mounted on the tower as well.

The Solution:

We wanted a high bandwidth link between the tower and the police station. We know that the city may add cameras later and the likely point of communication will go through the tower. Maximizing the link from the tower to the police station will future-proof the installation.

We chose Ubiquiti Air Fiber as that link. It is less likely to be affected by interference and provides a theoretical 1 Gigabit connection.

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

For the cameras in strategic locations, we wanted to provide flexibility in where the cameras and radios will be placed. We know that they will want to add cameras later and time will change the requirements for where the cameras are needed.

For these radios, we chose Ubiquiti AirMax Rocket Prism 5AC with a 120-degree sector antenna. The large angle allows the radio to be moved around as needed. Since we had two locations that were not within 120 degrees of each other, we needed two of these radios covering 240 degrees total.

The camera choice was simple: Axis Q6135-LE cameras fit the bill easily. With 32x optical zoom, the city will be able to see almost anywhere within several miles of the tower. These Pan-Tilt-Zoom cameras (PTZs) also have excellent low-light visibility. They wanted 360-degree coverage from the tower, so two cameras were needed.

To be clear, I don’t mind heights. But 175 feet in the air is above my limits and pay grade, so we hired a professional. Enter Kasper. Kasper’s Business Kaap Kom focuses on communication and radio towers. He came recommended to us by a current client. (After spending all day with him, I couldn’t recommend him enough.)

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

The Result:

Kasper did all of the scary work with us as his ground crew. It took seven hours to mount all the equipment, install the cables, and carefully align the radios. There were some hiccups along the way, but our team was able to get past each one and successfully deliver the desired result.

We ended up with over 750 Mbps link back to the police station and 350 Mbps for both remote links. The wireless connection can support around 100 cameras spread throughout the city wherever they are needed. The two PTZs can see details for miles. All in all, it was a mission accomplished and another great project. Radio Towers? Yes, we do that too.

Need help with your commercial security requirements? Just give us a call.

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

Sustainability in Security: 5 Eco-Friendly Solutions to secure your people, property and possessions.

By Gina Stuelke, CEO of Kenton Brothers

Sustainability in SecurityAs the global push for sustainability continues to grow, the physical security industry is embracing green innovations to balance robust protection with environmental responsibility. Here’s a look at how eco-friendly solutions are reshaping security practices:

Solar-Powered Security Systems

The Innovation: Solar-powered surveillance cameras, motion detectors, and perimeter lights are becoming increasingly popular for off-grid locations or areas looking to reduce energy consumption.

Benefits:

  • Reduces reliance on electricity grids, lowering operational costs.
  • Offers consistent functionality in remote areas.
  • Minimizes carbon footprints associated with traditional wired systems.

Example: Solar-powered video surveillance systems equipped with energy-efficient batteries can operate continuously, even in low-light conditions.

Energy-Efficient Hardware

The Innovation: Modern security equipment, such as LED-powered floodlights, low-power sensors, and energy-saving access control systems, are designed to consume less energy. Replacing traditional lighting with LED solutions in surveillance systems significantly reduces energy usage. LED lights offer longer lifespans and lower maintenance costs, aligning with eco-friendly objectives.

Benefits:

  • Lower utility bills and reduced environmental impact.
  • Extended lifespan of equipment due to advanced energy management.

Example: Smart lighting systems that activate only when motion is detected, significantly cutting down unnecessary energy use.

Biodegradable and Recyclable Materials

The Innovation: Security products such as fencing, bollards, and barriers are now being made from biodegradable or recyclable materials without compromising durability.

Benefits:

  • Reduces waste during replacements or upgrades.
  • Promotes circular economy practices in the security sector.

Example: Barriers made from recycled plastics or biodegradable composites that offer the same strength as traditional materials.

Remote Monitoring to Reduce Travel Emissions

The Innovation: Cloud-based security systems enable remote monitoring and management, reducing the need for on-site visits by security personnel.

Benefits:

  • Reduces travel-related emissions.
  • Enhances efficiency with real-time alerts and centralized control.

Example: Security firms offering remote patrol services via drones or AI-driven surveillance systems.

Green Building Certifications for Security Integration

The Innovation: Incorporating eco-friendly security solutions into buildings aiming for LEED (Leadership in Energy and Environmental Design) or similar certifications. A 2023 survey revealed that nearly 23% of physical security professionals anticipate manufacturers will adopt green practices to add value or differentiate themselves. Additionally, around 22% expect stricter government regulations to promote sustainability and advancements in technology making greener products more accessible.

Benefits:

  • Aligns security measures with sustainable architecture goals.
  • Increases property value and appeal for environmentally conscious stakeholders.

Example: Installing smart locks, renewable-powered security gates, and energy-efficient HVAC-integrated monitoring systems in green-certified buildings.

Challenges and Solutions

While eco-friendly security systems offer numerous benefits, challenges such as higher upfront costs, limited technology awareness, and the need for specialized maintenance can hinder adoption.

Solutions:

  • Government incentives and tax breaks for sustainable infrastructure.
  • Partnerships between security firms and green technology companies.
  • Educating businesses on the long-term cost and environmental benefits of green security alternatives.

Adopting sustainable security solutions is no longer just an ethical choice but a business imperative in today’s eco-conscious world. By integrating green innovations, the physical security industry can contribute to environmental preservation while maintaining high standards of safety and protection.

Not sure where to begin? Give us a call.

Facial Authentication vs. Facial Recognition: Understanding the Differences and Applications

By Gina Stuelke, CEO of Kenton Brothers

Facial Authentication vs. Facial RecognitionBiometric technologies have gained immense popularity for their convenience and enhanced security. Among these technologies, facial authentication and facial recognition stand out as two of the most discussed and applied innovations. While the terms are often used interchangeably, they refer to distinct processes and serve different purposes.

In this blog post, we’ll break down the differences between facial authentication and facial recognition, their underlying technology, and their real-world applications.

What is Facial Authentication?

Facial authentication is a biometric verification process where a system compares the face of a user to a pre-stored image (or template) to confirm their identity. This technology is primarily used in situations where a user must prove they are who they claim to be, such as when unlocking a smartphone, accessing a secure area, or logging into a banking app.

How it Works:

  1. Enrollment: The user enrolls their face into the system by scanning it, typically with a camera. This creates a template, which is a mathematical model of the facial features.
  2. Comparison: When the user attempts to access the system again, their face is scanned in real-time and compared to the stored template.
  3. Matching: If the live scan and stored template match within a certain threshold, the user is authenticated.

Key Features:

  • One-to-One Comparison: It compares a user’s face against their own stored template, confirming their identity.
  • Security: It is typically used in secure environments where users need to prove their identity (e.g., smartphones, banking apps).
  • User Control: Users usually initiate the process and consent to the comparison.
  • Common Applications:
    • Smartphone unlocking (e.g., Apple’s Face ID)
    • Secure access to apps and services (e.g., banking apps)
    • Physical security systems (e.g., building access)

What is Facial Recognition?

Facial recognition is a broader technology used to identify or verify a person from an image or video in a database or a public setting. Unlike facial authentication, facial recognition often works without the active involvement or consent of the individual and can be used in surveillance or identification tasks.

How it Works:

  1. Image Capture: A camera or video feed captures the face of a person in real-time or from a photograph.
  2. Feature Extraction: The system extracts facial features from the image and creates a biometric template.
  3. Database Search: The system compares the facial features to those in a large database to find a match.
  4. Identification or Verification: If a match is found, the person is identified or their identity is verified. If no match is found, they remain unidentified.

Key Features:

  • One-to-Many Comparison: Facial recognition systems compare a person’s face against many stored templates in a database.
  • Surveillance and Public Use: It’s often used in public spaces for surveillance, identifying individuals without their active participation.
  • Privacy Concerns: Since individuals may not know when their face is being scanned, the technology has raised privacy and ethical concerns.
  • Common Applications:
    • Law enforcement and criminal identification
    • Airport security and border control
    • Retail and commercial surveillance
    • Marketing and customer analytics (e.g., identifying returning customers)

Key Differences Between Facial Authentication and Facial Recognition

Facial Authentication

Purpose: To verify an individual’s identity
Comparison Type: One-to-one comparison (individual vs. stored template)
User involvement: Requires user participation
Security vs. Convenience: Primarily for security (e.g. unlocking devices)
Privacy concerns: Lower (user initiates the scam)
Common User Cases: Smartphone authentication, banking apps Law enforcement, public surveillance, marketing

Facial Recognition

Purpose: To identify or recognize individuals in a crowd
Comparison Type: One to many comparison (individual vs. database)
User involvement: Can be passive and without user consent
Security vs. Convenience: Primarily for identification tracking
Privacy concerns: Higher (can be used without user consent)
Common User Cases: Law enforcement, public surveillance, marketing

Privacy and Ethical Considerations

While both technologies offer undeniable benefits, they raise important privacy concerns, particularly facial recognition. Since facial recognition can be used without the knowledge or consent of the individual, it poses potential risks related to surveillance and the tracking of individuals in public spaces. Many governments and organizations are still working to strike a balance between the benefits of these technologies and the protection of individual privacy. On the other hand, facial authentication, which requires user consent and involvement, is generally considered less invasive, as it is used for secure access to personal devices or services.

Facial authentication and facial recognition are two powerful biometric technologies with distinct purposes and applications. Facial authentication is typically used to verify a user’s identity for security purposes, while facial recognition is used to identify individuals from a crowd or a database. Understanding these differences is crucial, especially as both technologies continue to evolve and become more integrated into our daily lives.

Whether you’re concerned about privacy, security, or convenience, it’s essential to stay informed about how these technologies are being used and regulated. We are here to guide you, give us a call.