Exciting News From Axis Communications – Device Manager Extend is a Major Innovation!

Device Manager ExtendBy David Strickland, Vice President of Kenton Brothers

Axis recently announced a huge innovation that will impact Axis camera users all over the world. Innovation is one of Kenton Brothers core values and we use the tagline “Innovate or Die” all the time. We enjoy seeing technology evolve and take the next step. In this case Axis took a huge leap!

Device Manager Extend

Axis rolled out the Axis Device Manager Extend tool that will help users worldwide manage all of their Axis Communications devices. It’s an easy-to-use utility tool that allows users to interact with AXIS devices in real time and make updates from a single dashboard. This is a huge advantage for enterprise level commercial surveillance systems.

Axis Device Manager ExtendThe New Axis Device Manager Extend will give you real time status awareness of all devices across all sites. It also gives you an inventory of all devices and if there are any anomalies. The dashboard provides warranty information and if components are reaching end of life. You can even determine the replacement model and start to budget for new equipment. The dashboard also allows you to export a list of all your devices including serial numbers, MAC addresses and model numbers.

Device Status

A user can get real time device status including firmware, cybersecurity status and how applications are working on the device. You can access your Axis devices remotely, giving you centralized control of your security platform. You can discover the firmware of your devices and then push the updates to your entire platform in three clicks. (This used to be a device-by-device task that would take days or weeks to accomplish.) You can remotely fix many problems without the expense of rolling at truck.

Have you ever updated a device’s firmware and found a problem?

Axis Device Manager ExtendAxis Device Manager Extend will also allow you to roll back firmware updates if an issue pops up. Before you upgrade, the manager will analyze your system and make recommendations on what firmware versions to use during the upgrade.

How about Cybersecurity Control?

You can now control device settings remotely for the entire platform. You can require password changes, turn off anonymous access, turn off port forwarding and log every interaction with every device. Using the tool will ensure and maintain compliance and consistency across your systems. (The key word being consistent.)

The best news about this tool is that it’s available today! Whether you’re an IT Professional trying to stay on top of a 6,000 camera commercial video surveillance system or a business owner trying to make sure your 16 camera system isn’t creating a cybersecurity risk, this tool is for you!

Please give us a call to learn how you can deploy this amazing, innovative tool today.

Unusual, Hard to Find Security Tools. Kenton Brothers Has Them.

By Erik Andress, Sales Management Professional at Kenton Brothers

Hello, everyone. Erik Andress here with Kenton Brothers, and this month we’re discussing unusual and hard to find security products. Here at Kenton Brothers, we offer a comprehensive security solution. But what does that mean? It means our efforts try to extend your perimeter, and we work from the outside in, so we have to offer a wide variety of security products that aren’t talked about every day.

Today, we’re going to explore some of these unusual and sometimes hard to find security products. If you find yourself in need of a security part that’s a little bit out of the norm, be sure to check with us here at Kenton Brothers.

Unique Security Products

It may not be every day that you’re looking for postal boxes or partial storage solutions for online deliveries, but when you do, we’ve got you covered.

Part of that layered security approach may involve metal detection systems, weapon detection systems, or full height and optical turnstiles.

Security used to mean you just needed a set of keys. Now, for the right application, you need a really big lock. Well, for those needs, we’ve got something for that too.

My guess is you can also find some really good scenarios where a tornado shelter or a safe room would be really beneficial.

Thermal radar may be a really good option for you as well. Utilizing a rotating thermal sensor along with edge based detection algorithms, you can detect, classify, and geospatially locate any threat to your perimeter. Not only do you get a GPS coordinate of the intrusion, but you also get a thermal image of it within your security plan. If there are important yet repetitive tasks like certain alarm responses or vendor escorts, or roving audits, you could have a robot do it.

Frankly, there’s way too much to cover in one video! We also provide safes, ballistic laminates, time locks, bill traps, seismic sensors, body cams, drone detection and anti drone systems, and the latest in video analytics. So if you find yourself looking for an unusual or hard to find security product, reach out to us here at Kenton Brothers. We’d love to help you out.

Viakoo can proactively update IoT devices, strengthening your protection against hacking attempts.

By Neal Bellamy, IT Director at Kenton Brothers

ViakooHacking, at its root level, is a person using a computer program for a purpose that is not intended. It’s like discovering a person walking a dog and then using the dog to attack someone. That wasn’t the intent of the person walking the dog, but the hacker was able to take control. In order to “hack”, the attacker must find a weakness in the software and then exploit the weakness. In the ever-evolving game of cat and mouse, weaknesses get found and software gets modified to patch those weaknesses.

Most successful hacks are possible because the software on a device is outdated.

Even though previous weaknesses have been fixed with software updates, the newest software has not yet been installed, and new weaknesses are found that can be exploited.

In other areas of information technology (IT), we have tools to detect and notify us when software needs to be updated. Most people are probably familiar with Windows Update, the little icon on the lower right that tells us new software is ready to be installed. There are many other systems that can also notify and even update the software automatically. But there is an area of IT that generally gets missed…

The Internet of Things

Viakoo IoTThe Internet of Things (IoT) is defined as “a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.”

IoT has been around for decades. We’ve used and interacted with IoT devices in our offices for as long as I can remember. Things like copiers, scanners, and credit card machines are all examples of devices that usually are on the network and can send and receive data.

In the commercial security world, cameras and access control panels are also IoT devices. Anything that you can interact with and not have to touch is an IoT device. Can you adjust your thermostat from anywhere in the world? If so, It’s an IoT device. IoT is transforming our world and has been for many years now. It is making our lives more convenient and more connected. The security risk with IoT is that most devices are installed and never updated. If there is a security weakness detected, the software may never get installed… leaving that device wide open for being compromised.

Most companies spend a lot of IT time and money protecting servers, firewalls, and desktops to make sure that they have the latest software updates and are secure. But the IoT devices are usually left out of the discussion. IoT devices are now one of the largest attack vectors for malicious hackers. These “Set and Forget” devices are often left unprotected and sometimes directly connected to the internet. (Please don’t connect anything, except a firewall, directly to the internet; There are better ways.) As a whole, we have to do a better job of protecting these devices.

Part of the answer for the physical security world could be Viakoo’s new offering.

Viakoo dashboardViakoo has been offering camera, access control, and IoT monitoring for quite a while.

At their core, Viakoo will catalog all of your devices and monitor them at varying levels to make sure they are operational. And now Viakoo is taking it to the next level. Viakoo is offering IoT risk evaluation and IoT risk remediation. In evaluating the risk of each IoT device, Viakoo looks at the password, security certificates, and installed firmware version for each of the IoT devices. In supported devices, passwords can be changed and because Viakoo is already connected to some video management software (VMS), it can even change the password in the VMS so the video is not lost. Viakoo can also install new certificates in supported IoT devices so that they can be trusted at a higher level.

Viakoo can push new firmware to all the devices across the network. Since Viakoo architecture is already designed to be installed at multiple sites and buildings, the firmware can be pushed across the entire corporate footprint at the same time. Viakoo works across many hardware and software manufacturers, which most competing systems are not yet capable of doing, making Viakoo a good choice for almost any business with IoT devices.

Viakoo is a simple subscription-based software that can catalog, evaluate and secure all of your IoT devices. If you want help in securing your IoT Devices, please give us a call!

What is a Security Systems Integrator? A robbery gives some perspective.

By David Strickland, Vice President of Kenton Brothers

What in the world is a Security Systems Integrator?

How a robbery helped me understand the importance of a Security Systems Integrator.That is a great question and one I hope to answer with this story. Eleven years ago, I had no idea what a security integrator was either. It wasn’t until I got involved in the security industry and saw firsthand what a Security Systems Integrator was and why they’re so important to so many organizations.

First let me tell you a story about a time we got robbed…

It might surprise you to know that my first involvement with a security company was like many of you. I had an alarm system put into my business. I did my research and picked a reputable, big-name company to do the work. It was a straightforward process. I was happy with my provider and trusted that they knew what they were doing. The alarm system worked great for years.

Fifteen years later I had sold my company to a much larger organization and was working with them in a brand new, large operational center in the southeast United States. This operational center counted and stored very large amounts of cash and checks and processed them daily. Security was critically important. The large company I worked for did the same thing I had done fifteen years prior. They called a big-name company to come out and install a security system to protect their assets.

The representative from the security company was in the 30,000 sq ft building for 30 minutes. A week later, they installed 2 keypads, 4 glass break sensors, some motion detectors, 2 sets of door contacts and one siren. They also installed three cameras… One in the cash room and one at the front door.

It was a great idea to have the cameras installed.

Shooting GlassWithin the first week of opening, late at night, we were able to see a person shoot out the glass entryway of our lobby and enter the building. He ran straight to the cash room and kicked in the door. We watched him go right to the safe we had installed and enter the code. He opened the door of the safe within two minutes of entering the building. And he was on his way out carrying an armful of envelopes full of cash and checks, dropping some along the way. It was obviously a person with inside knowledge of our systems and the location of the security devices.

It turns out the alarm didn’t go off and no one was notified until 6am the next morning when the first employees arrived and saw the carnage. Our security system was not installed by a Security Systems Integrator. It was installed by a subcontractor of a national alarm company. There’s a big difference.

A Security Systems Integrator like Kenton Brothers Systems for Security would approach this building and the liability of the cash and checks in a very different way.

Using the Defense in Depth model we would have recommended a layered approach with the following considerations:

  • An exterior camera would be added to extend the perimeter and alert when there was car activity in the parking lot after operating hours
  • All doors would always be locked and require key or credential entrance
  • The alarm would arm automatically at a predetermined time
  • If the alarm did not arm or was disarmed outside of normal hours, an alert would be issued
  • The cash room door would be reinforced with a five-point door and a steel reinforced frame
  • All the codes on the safe would have been changed after install and assigned to the person opening the safe, which would require dual authentication for access
  • The intrusion system would be tied to the surveillance system. A video feed would be sent to the monitoring company to dispatch police as a verified crime in progress for priority response.

This true story seeks to point out the differences between an alarm company and a Security Systems Integrator. A Security Systems Integrator specializes in bringing independent security components together ensuring that those components function together properly to protect people, property, and possessions. These components include IP video surveillance, access control, intrusion detection, mass notification, weapons detection, analytics and more. Fully developed Security Systems Integrators are considered ‘design-build’ integrators.

Security Systems Integrators can provide the following services:

  • Security risk or needs assessments
  • Customized system engineering and design
  • Broad access to the leading manufacturers and product lines
  • Procurement, staging, installation, commissioning and training
  • Full lifecycle service and maintenance
  • System updates and operational upgrades

A Security Systems Integrator can take advantage of their unique perspective on the key ingredients for successful development of a physical security program. We like to call it the KB Advantage – utilizing over a century worth of experience and wisdom to assess, design, engineer, install, commission, train and maintain a remarkable physical security system.

If you want to know more about how we can help you develop a layered security approach for your organization, please give us a call.

Are you running up your Security Debt?

By David Strickland, Vice President of Kenton Brothers

Security DebtOver the last 10 years, companies, schools, churches and local government entities have invested billions of dollars in improving physical security to reduce risk and keep their people, property and possessions safe. As crime has increased, security directors and those responsible for security have done their best to meet the challenge and adapt to the threat levels they face.

With the increased speed of technology advancements, the sophistication of criminals evolving and the reduction of qualified workforce to run and maintain the physical security equipment, organizations find themselves getting deeper and deeper into ‘Security Debt”.

Security Debt: The inability to maintain and service existing physical security systems to their proper functioning standard.

Security Debt begins with smaller things like not acknowledging alarms and alerts in the access control system. Or maybe your organization hasn’t had the normal lobby guard back since the pandemic. Maybe your organization has skipped the last few camera cleaning trips around the building because there isn’t enough time to get to it this month. Sometimes it’s a policy or procedure that no longer is followed like inspecting and locking the doors when school starts.

The good and bad news is that you’re not alone. Organizations just like yours are facing the same struggles. The Security Debt piles up month after month.

Security Debt vs the US Debt Calculator

A snapshot of the realtime US Debt Clock. For an updated view, please visit https://www.usdebtclock.org.

The biggest issue with Security Debt is that it won’t go away on its own. Just like credit card debt that millions of people have, Security Debt gets bigger every month when we don’t actively manage it. The interest compounds and we press against the debt ceiling hoping we don’t have an emergency that exposes our liability. This emergency might appear as a system failure, a missed internal theft or a major life altering event.

An estimated 81% of physical security systems are not currently up to date with firmware and software updates.

Just like financial debt, you must make a plan to get out of Security Debt.

Here are our suggestions on how your organization can get out of Security Debt:

Make a Plan – Yes, I know we just said that, but it’s worth repeating.

  • Bring together the key shareholders in your organization and document the Security Debt you are acquiring.
    • What physical security systems do you have deployed? (Access control, IP video surveillance, intrusion detection, duress systems, mass notification, lobby and guest management, weapons detection, physical security guards, perimeter fencing, parking control.)
    • What type of maintenance and upkeep do these systems need to be kept in optimal operating status? (Cleaning, adjustments, firmware and software updates, alarm and signal maintenance, periodic testing, inspections.)
    • What are your resources to complete the maintenance and upkeep lined out above?
  • Create a timeline and responsibility matrix
    • Who is responsible for what task and by what date?
    • What resources are needed? (Budget, People, Contractors)
  • Change your policies and procedures to match the current business environment
    • Automating the lobby so that a guard is not necessary
    • Changing locks to always be locked and unlocking only when passing through
    • Outsource your ongoing system support
  • Report back progress monthly
    • It’s important to close the loop
    • Reprioritize if necessary
    • Share best practices

Security DebtOne of the best ways to get rid of this debt is to outsource the maintenance and support of your systems. Establishing a relationship with a trusted security partner such as Kenton Brothers Systems for Security is something we would love to talk with you about. Think of us as a fractional Chief Security Officer. Kenton Brothers has manufacturer trained personnel to help maintain your investment as well as manage your daily alarms, annual firmware upgrades and ongoing operating system updates. We have certified physical security experts on staff that can help create policy and procedures for your specific situation.

You have other things to concentrate on. Let Kenton Brothers Systems for Security help you get rid of your “Security Debt”. Let’s talk!