Commercial Security and Video Surveillance Project in New Mexico… with a rare find!

By Neal Bellamy, IT Director at Kenton Brothers.

In July, we were tasked with converting several banks in New Mexico to new security and video system. No two branches were alike. Some had analog video, some had digital, sometimes there was a Honeywell panel, sometimes DSC, sometimes no panel at all. And just like any road trip, it can’t be perfectly smooth, there have to be some bumps.

Our two adventurers this time were Terry McCurdy and Ryan Holtshaus.

New Mexico ProjectThey loaded up the van and began their merry journey just after the fourth of July weekend. In the end, they converted seven branches to Honeywell intrusion panels and Milestone Video management, but it’s the stuff in the middle that makes it the best.

At some point in the trip, they needed some more BNC connectors. Even though the guys had left “loaded for bear”, they had used up all of their supply of those connectors and needed more. For those of you who don’t know… BNC connectors have kind of gone the way of the dodo bird. They used to be everywhere, but now they are much harder to find in a store.

In Kansas City, I can only think of 2-3 places where we can get BNC connectors. In Santa Fe, there’s only one.

A-1 Communications to the rescue!

A-1 Communications in New MexicoTerry said the store was really cool. It was full of modern-day electronics like you would expect, but what made it cool was the older electronics. One such piece of art was a tube tester that the owner had created. It‘s amazing to me how much skill was required to make electronics years ago.

When Terry was done with his purchase, the man behind the counter said, “Let me put those in a bag for you.” After he was done, he asked, “Do you know why I put them in a bag for you?” Of course, Terry didn’t know. The man said, “So when you lose them, you lose all of them and have to come back.” Ha! How’s that for truth in advertisement?

When you’re out of town, you have to enjoy the local treats.

The guys had dinner at the Church Street Café. This establishment was owned as a home for 400 years and then turned into a restaurant. The restaurant has some amazing southwestern features and great food. (The guys give it two-thumbs up.)

Overall, it was a long two weeks, but the customer was thrilled with the success of the project. They commented to me after it was all done that they were impressed with Terry and Ryan’s tenacity and creativity towards creating solutions. It was great to hear that… that’s why we’re here. To solve the customer’s problems and have some adventures along the way. Here’s to the next time, we’re on the road!

Church Street Café

Solving Their Pain: Warehouse Security Project in Wichita, KS

By Neal Bellamy, IT Director and Brinton Hallum, Project Manager at Kenton Brothers.

The Pain

Wichita Project SpotlightA large warehouse customer of ours was in a lot of pain when it came to their various security systems.

  • The video management system was consistently crashing with cameras bouncing offline. On top of that, the user interface was not very user-friendly.
  • The wires for all the systems were a mess, making maintenance hard.
  • The Access Control system was in bad shape. Nests of exposed wires that weren’t labeled. Controllers accessible to anyone and often locked by a broken nail slipped through an eyelet.
  • The intrusion system had frequent false alarms and sensors that weren’t working.

None of these items were up to KB Standards.

Our customer takes a lot of pride in their business, that includes the security of their people, products and property. Their culture is “Promises Kept”. We promised them an enterprise system that exceeds their expectations and that’s exactly what we delivered.

The Plan

Wichita Project SpotlightTo ease their pain on Video Surveillance and Access Control, we brought in Avigilon.

Working directly with the manufacturer, we were able to design a system that will meet the needs of the customer and alleviate their pain. We also provided additional features such as License Plate recognition, Appearance Search and Learning Analytics to eliminate false motion triggers from blinking lights.

Avigilon Control Center directly integrates into Avigilon Access Control Manager, providing additional information for the video system. This means that they can search for video based on access control events like access granted/denied, door left open or door forced.

There are many benefits for a combined Access and Video system worthy of a blog post all by itself.

For the Intrusion/Fire system, we designed a Bosch Fire/Burg B9512G. This is the Cadillac of Fire/Burg and provides all the bells and whistles. We utilized a touch screen keypad to allow for visibility of Areas and custom triggers for Fire/Medical/Tornado. We tested each and every point, and adjusted so the customer doesn’t have to worry about false alarms.

The Team

Wichita Project SpotlightThe timeline for the installation was short, so we used several guys from the Kansas City office to get the job done.

Being away from home is bittersweet; there’s always places to explore, but being cooped up in a hotel room is trying. This time we did something different. We rented an Airbnb for our guys. Everyone had their own room, and they got to cook real food and have some bonding time together.

The guys worked hard and very well together. Each has their own specialized knowledge and skill set. This allowed them to focus on their own areas of expertise, but also help each other grow and learn.

Jeremy’s great knowledge of door hardware and all things conduit allowed him to create a camera mount that would keep the cameras level, even though the rafters weren’t level.

Tony’s knowledge of all things intrusion helped him troubleshoot the communication issues that popped up at the worst time.

Neeley’s great at the programming side and he rocked it out, but he also got to learn how to wire up the panels for the first or second time expanding on his capabilities.

This was Meshack’s first adventure on a large installation; he got a trial by fire and did a great job.

Kenton Brothers’ greatest strength is our team. This is one of many instances where our team pulled together and exceeded the customer’s expectations.

Missouri Announces Final Medical Marijuana Security Regulations

By David Strickland, Vice President of Kenton Brothers.

Missouri DHSSThe Missouri Department of Health and Senior services has announced its final regulations for medical cannabis in the State of Missouri. This regulation is titled 19 CSR 30-95.040 Medical Marijuana Facilities Generally. The final regulation was published on June24, 2019.

Included in these regulations is an extensive and detailed security requirement. Many of these regulations were taken from others states including Colorado and Oregon. Our staff has studied these regulations… and I’ve included some very important things to know.

For this article we will point out the specifics around the physical security and the security management portions of the regulation. There’s a detailed inventory management and sales record requirements section in the regulation that we will not cover in this article. However, there should be special attention given to this section.

The state regulations reads:

1. Facilities shall install and maintain security equipment designed to prevent unauthorized entrance into limited access areas and to prevent diversion and inversion of medical marijuana including:

A. Devices or a series of devices to detect unauthorized intrusion, which may include a signal system interconnected with a radio frequency method, such as cellular or private radio signals, or other mechanical or electronic devices;

B. Except in the case of outdoor cultivation, exterior lighting to facilitate surveillance, which shall cover the exterior and perimeter of the facility;

C. Electronic video monitoring, including—

(I) At least one (1) call-up monitor that is nineteen (19) inches or more;

(II) A printer capable of immediately producing a clear still photo from any video camera image;

(III) Video cameras with a recording resolution of at least 1920 x 1080, or the equivalent, at a rate of at least fifteen (15) frames per second, that operate in such a way as to allow identification of people and activities in the monitored space, in all lighting levels, that are capable of being accessed remotely by the department or a law enforcement agency in real time upon request, and that provide coverage of—

(a) All entrances and exits of the facility, including windows, and all entrances and exits from limited access areas;

(b) The perimeter and exterior areas of the facility, including at least twenty (20) feet of space around the perimeter of an outdoor grow area;

(c) Each point-of-sale location;

(d) All vaults or safes; and

(e) All medical marijuana, from at least two (2) angles, where it is cultivated, cured, trimmed, processed, rendered unusable, and disposed;

(IV) A method for storing recordings from the video cameras for at sixty (60) days in a secure on-site or off-site location or through a service or network that provides on-demand access to the recordings and that allows for providing copies of the recordings to the department upon request and at the expense of the facility;

(V) A failure notification system that provides an audible and visual notification of any failure in the electronic monitoring system; and

(VI) Sufficient battery backup for video cameras and recording equipment to support at least sixty (60) minutes of recording in the event of a power outage;

D. Controlled entry to limited access areas, which shall be controlled by electronic card access systems, biometric identification systems, or other equivalent means, except that, in addition to these means, all external access doors shall be equipped with a locking mechanism that may be used in case of power failure. Access information shall be recorded, and all records of entry shall be maintained for at least one (1) year;

E. A method of immediate, automatic notification to alert local law enforcement agencies of an unauthorized breach of security at the facility; and

F. Manual, silent alarms at each point-of-sale, reception area, vault, and electronic monitoring station with capability of alerting local law enforcement agencies immediately of an unauthorized breach of security at the facility.

2. Facilities shall establish policies and procedures:

Medical CannabisA. For restricting access to the areas of the facility that contain medical marijuana to only persons authorized to be in those areas, which shall include, when necessary for business purposes, contractors hired for no more than fourteen (14) days and other visitors, all of which may enter the restricted area if they sign in and sign out of a visitor log and are escorted at all times by facility agents in a ratio of no less than one (1) facility agent per five (5) visitors;

B. For identifying persons authorized to be in the areas of the facility that contain medical marijuana;

C. For identifying facility agents responsible for inventory control activities;

D. For limiting the amount of money available in any retail areas of the facility and for notifying the public that there is a minimal amount of money available, including by posting of a sign;

E. For electronic monitoring;

F. For the use of the automatic or electronic notification and manual, silent alarms to alert local law enforcement agencies of an unauthorized breach of security at the facility, including designation of on-call facility personnel to respond to, and to be available to law enforcement personnel who respond to, any alarms; and

G. For keeping local law enforcement updated on whether the facility employs armed security personnel and how law enforcement can identify such personnel on sight.

 3. Facilities with outdoor cultivation shall construct an exterior barrier around the perimeter of the marijuana cultivation area that consists of a fence that is:

A. Constructed of six (6) gauge metal or stronger chain link;

B. Topped with razor wire or similar security wire;

C. At least eight (8) feet in height; and

D. Screened such that the cultivation area is not easily viewed from outside the fence;

4. Facilities with windows in a limited access area must ensure either that the window cannot be opened and is designed to prevent intrusion or that the window is otherwise inaccessible from the outside.

5. Facilities shall ensure that each video camera used pursuant to this section: A. Includes a date and time generator which possesses the capability to accurately display the date and time of recorded events on the recording in a manner that does not significantly obstruct the recorded view; and

A. Is installed in a manner that will prevent the video camera from being readily obstructed, tampered with, or disabled;

6. A facility shall make a reasonable effort to repair any malfunction of security equipment within seventy-two (72) hours after the malfunction is discovered. A facility shall notify the department within twenty-four (24) hours after a malfunction is discovered and provide a plan of correction.

A. If a video camera used pursuant this section malfunctions, the facility shall immediately provide alternative video camera coverage or use other security measures until video camera coverage can be restored, such as assigning additional supervisory or security personnel, to provide for the security of the facility. If the facility uses other security measures, the facility must immediately notify the department, and the department will determine whether the other security measures are adequate and for what amount of time those other security measures will be acceptable.

B. Each facility shall maintain a log that documents each malfunction and repair of the security equipment of the facility. The log must state the date, time, and nature of each malfunction; the efforts taken to repair the malfunction and the date of each effort; the reason for any delay in repairing the malfunction; the date the malfunction is repaired and; if applicable, any alternative security measures that were taken. The log must also list, by date and time, all communications with the department concerning each malfunction and corrective action. The facility shall maintain the log for at least one (1) year after the date of last entry in the log;

7. Each facility shall employ a security manager who shall be responsible for:

A. Conducting a semiannual audit of security measures to ensure compliance with this subsection and to identify potential security issues;

B. Training employees on security measures, emergency response, and theft prevention and response within one (1) week of hiring and on an annual basis;

C. Evaluating the credentials of any contractors who intend to provide services to the facility before the contractor is hired by or enters into a contract with the facility; and

D. Evaluating the credentials of any third party who intends to provide security to the facility before the third party is hired by or enters into a contract with the facility;

8. Each facility shall ensure that the security manager of the facility, any facility agents who provide security for the facility, and the employees of any third party who provides security to the facility have completed the following training:

A. Training in theft prevention or a related subject;

B. Training in emergency response or a related subject;

C. Training in the appropriate use of force or a related subject that covers when the use of force is and is not necessary;

D. Training in the protection of a crime scene or a related subject;

E. Training in the control of access to protected areas of a facility or a related subject;

F. Not less than eight (8) hours of training at the facility in providing security services;

G. Not less than eight (8) hours of classroom training in providing security services.

Key Points and Takeaways!

  • The facility must have ample lighting throughout the facility for video surveillance.
  • All crop must be under surveillance from two angles at all times.
  • All exterior grown crop must be lit for surveillance.
  • All video surveillance must be kept for sixty days and be accessible on demand remotely by the state and law enforcement.
  • All security devices must have a battery backup of at least 60 minutes.
  • Biometrics or equivalent must be used for access control.
  • All locations must have a silent duress alarm that automatically notifies law enforcement of unauthorized breach.
  • All windows must have preventative measures installed to keep windows from being opened from the outside.
  • Any malfunctions in the security equipment must be remedied within 72 hours and law enforcement must be notified within 24 hours of any malfunctions.
  • The regulation requires immediate remedy to any video surveillance malfunctions and must notify the state and the state will determine if production may continue or be shut down until remedied.
  • Each facility must employ a security manager.
  • Perimeter fencing with or a wall must be constructed around grow sites.

Kenton Brothers Inc. can help create your security plan and provide the knowledge, experience and resources to design and integrate a fully compliant system and help keep it up and running to keep you up and running.

Hospital & Healthcare Security Systems: A Healthy Approach to Security & Beyond

Medical Security Solutions

Healthcare security systems involve far more than basic security products. These systems, when integrated with logical, comprehensive solutions and technology, keep a hospital or facility’s people and assets safe. When everything is secure, a hospital can confidently move forward in achieving its real mission: providing patients the best possible care in the safest environment possible.

Security as a Means to Protect Patients and Staff

Unified Access Control

Unified access control allows you to assign levels of facility and area access based on staff function. Paired with video surveillance, it allows for active medical facility monitoring and recording activity, as well as global and departmental lockdown capabilities. Integrating access control and video provides centralized control for easy administration and management.

IP Video Surveillance

Take advantage of your existing network by connecting IP video surveillance to it. Strategic installation offers a clear view of patients and facilities. Surveillance signage can deter unsafe and would-be criminal acts. Captured images can be used as evidence and to identify individuals.

Staff Security & Protection

Staff’s badges can be equipped with wireless call functionality. Paired with wall-mounted devices, staff can discreetly summon help over your wireless network or current Wi-Fi. With an active-RFID, RTLS badge, staff members press or pull it when they need assistance or are facing a threatening situation. RFID technology detects their specific location, so responders can arrive quickly.

Intrusion Detection Systems

Your healthcare facility’s needs and layout determine recommendations for the latest options in intrusion detection. Many options, ranging from minimum to maximum solutions, are available to fit staff and patient needs.

Emergency Notification Devices

Quickly and concisely guide people out of harm’s way whether they’re inside your hospital or on the grounds or parking areas. Incidents are triggered via buttons, consoles, panels and inputs. Designate notification channels. Then, provide emergency directions through communication systems, such as media displays, phone, text, PA systems and more.

Wandering, Elopement and Fall Detection

Track patients or residents with technology features that give them a better quality of care, give families and staff peace of mind, and allow your operations to flow more smoothly. Once sensors and tags are in place and the detection system is deployed, users receive an alert and quickly respond if someone wanders, strays or falls to improve care and minimize risk.

Infant Protection

Protect your most vulnerable patients and give staff and new parents peace of mind. Through comfortable tags with tamper alarms and integration with infrastructure, such as access control systems, door locking systems and security cameras, staff can protect infants and focus on their care.

Security as a Means to Create the Safest Healthcare Environment Possible

Asset & Equipment Management

Mark mobile medical equipment with asset tags, which seamlessly communicate with existing systems to provide exact location and condition. In addition to controlling inventory, medical staff can quickly locate then access critical medical equipment, speeding up workflow and delivering better overall patient care.

Environmental Monitoring

Meet compliance standards and prevent product loss with environmental monitoring. Record and track temperature and condition data of mission-critical medicines, vaccines, blood and lab samples to ensure all are safe and ready for patient use. Save time and money by eliminating the need for manual reporting and recording data remotely.

Global Threat Reduction Initiative (GTRI)

Prevent terrorists from obtaining materials that can be used in radiological attacks by implementing security requirements established in the GTRI framework of convert, remove and protect. Hospitals support the initiative with remote monitoring, access control systems, alerting local law enforcement of an event, disposing properly of unused radiological and nuclear materials, and protecting radiology and nuclear medicine equipment still in use.

When it comes to hospital security systems, there are many factors to consider – from the type and size of your facility and the type of medical inventory to the people who work and visit there every day. The goal is to secure people and assets from every imaginable internal and external threat. Yet, unless regulations, your equipment or your surrounding community dictates it, you want your hospital secure, yet a welcoming space where your staff can carry out your true mission, caring for patients in a safe environment.

Schedule your hospital security systems consultation by calling us at 816-842-3700.

The Most Effective Warehouse Security Solutions Today: Part High Tech, Part Low Tech Fundamentals

The most effective warehouse security plan combines high tech and low tech, foundational solutions. Working together, these solutions create a safe, secure environment no matter how tight or sprawled out your area. No matter how many people come in and out a day. No matter what type of inventory is warehoused.

High Tech Warehouse Security Solutions

Warehouse Security SolutionsSmart Building Technology

Meet compliance standards and prevent product loss with environmental monitoring that records and tracks temperature and condition. Smart building technology replaces manual recording and reporting, which saves time and money. This technology can deliver real-time notifications of any environmental changes that could put your inventory or machinery in danger. This can include monitoring for fire and flood.

RFID Tracking & Systems Integrations

Placing RFID tags on products manages and tracks inventory, which eases administrative duties by monitoring inventory at any stage from packaging, assembly and storage to point-of-sale, etc. With RFID tracking, you can store and back up data to the cloud in real time.

Unified Video Surveillance & Access Control

Allow entrance to certain warehouse areas based on security clearance and job function with an access control system. When used in conjunction with commercial video surveillance, it’s possible to actively monitor your facility and record suspicious activity. When integrated, these two systems can centralize control for simple administration and management.

 IP Video Surveillance

Most warehouses have a network already in place. Take better advantage by connecting IP video surveillance to it. Strategic camera placement can give a clear view of people and grounds. Plus, the footage captured can be used later as evidence or to identify areas for workflow improvement.

Intrusion Detection Systems

Protecting against intrusion can be a matter of barricading doors and windows from the inside. Intruder defense devices are constantly improving, so our team carefully evaluates the newest options in context of your warehouse’s needs to recommend specific products for your facility’s size and layout.

Metal Detectors

They’re a deterrent, plain and simple. Hand-held or walk-through metal detectors add a level of contemporary security technology to warehouses. And, just knowing they’re there is a symbolic component of any warehouse security system.

Fundamental Warehouse Security Solutions

Warehouse Security SolutionsDoor Frames & Locking Hardware

Perhaps the oldest, but still effective means of warehouse security are commercial-grade cylindrical and mortise door locks, closers, panic bars and keying systems that can be used with frames crafted from metals and woods.


When crowd control and queuing are required either indoors or out, Mechanical and electronic waist high turnstiles regulate traffic flow. Electronic turnstiles can be integrated with an electronic access control system work seamlessly together for stronger security.

Perimeter Fencing

Fencing is another physical barrier that is so low tech that many warehouses forget about it. Fencing around the vicinity keeps people out of areas they shouldn’t access. It also creates an aura of protection, especially when used with lighting and security cameras. Fencing could be enough of a deterrent for criminals to find another target. If not, your security camera could catch criminals trying to go through, under or over fencing, then alert you in enough time to call the authorities before any harm is done.

Install Security Signage

Signage is so effective that people who don’t own a dog hang “Beware of Dog” signs for security reasons. Surveillance signage can deter criminal acts, as criminals move along looking for an easier target than your warehouse. Security cameras are prevalent today, and criminals know this.

Employee Communication

Communicate with employees to find out where some of the biggest holes in your warehouse security are. Perhaps no one knows your facility better than those who are on the floor 40+ hours per week. Employee communication also makes your team feel like their voice matters, which could improve morale and reduce theft.

When it comes to warehouse security, there are so many factors to take into account – from the size of the facility and the type of inventory to the people who work and visit there every day. The goal is to secure the area, stock and people from every imaginable internal and external threat. Yet, unless regulations or your inventory dictates it, you want your warehouse as secure as Fort Knox without necessarily “feeling” locked down like Fort Knox.