Radio Towers? Yes, We Do That

By Neal Bellamy, IT Director at Kenton Brothers

Radio Towers? Yes, we do that.In today’s episode of “Yes, we can do that”, I bring you Radio Towers. It’s not the first time we have placed equipment on towers, but this time I have pictures!

The Problem:

A municipality approached us with two issues they wanted to solve.

First, they wanted cameras installed in strategic spots around their city, but did not have any network infrastructure to get the signal back to the police station. Second, they wanted to create a security perimeter around the radio tower itself. There was some extra credit available if we could get some long-distance cameras mounted on the tower as well.

The Solution:

We wanted a high bandwidth link between the tower and the police station. We know that the city may add cameras later and the likely point of communication will go through the tower. Maximizing the link from the tower to the police station will future-proof the installation.

We chose Ubiquiti Air Fiber as that link. It is less likely to be affected by interference and provides a theoretical 1 Gigabit connection.

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

For the cameras in strategic locations, we wanted to provide flexibility in where the cameras and radios will be placed. We know that they will want to add cameras later and time will change the requirements for where the cameras are needed.

For these radios, we chose Ubiquiti AirMax Rocket Prism 5AC with a 120-degree sector antenna. The large angle allows the radio to be moved around as needed. Since we had two locations that were not within 120 degrees of each other, we needed two of these radios covering 240 degrees total.

The camera choice was simple: Axis Q6135-LE cameras fit the bill easily. With 32x optical zoom, the city will be able to see almost anywhere within several miles of the tower. These Pan-Tilt-Zoom cameras (PTZs) also have excellent low-light visibility. They wanted 360-degree coverage from the tower, so two cameras were needed.

To be clear, I don’t mind heights. But 175 feet in the air is above my limits and pay grade, so we hired a professional. Enter Kasper. Kasper’s Business Kaap Kom focuses on communication and radio towers. He came recommended to us by a current client. (After spending all day with him, I couldn’t recommend him enough.)

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

The Result:

Kasper did all of the scary work with us as his ground crew. It took seven hours to mount all the equipment, install the cables, and carefully align the radios. There were some hiccups along the way, but our team was able to get past each one and successfully deliver the desired result.

We ended up with over 750 Mbps link back to the police station and 350 Mbps for both remote links. The wireless connection can support around 100 cameras spread throughout the city wherever they are needed. The two PTZs can see details for miles. All in all, it was a mission accomplished and another great project. Radio Towers? Yes, we do that too.

Need help with your commercial security requirements? Just give us a call.

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

Sustainability in Security: 5 Eco-Friendly Solutions to secure your people, property and possessions.

By Gina Stuelke, CEO of Kenton Brothers

Sustainability in SecurityAs the global push for sustainability continues to grow, the physical security industry is embracing green innovations to balance robust protection with environmental responsibility. Here’s a look at how eco-friendly solutions are reshaping security practices:

Solar-Powered Security Systems

The Innovation: Solar-powered surveillance cameras, motion detectors, and perimeter lights are becoming increasingly popular for off-grid locations or areas looking to reduce energy consumption.

Benefits:

  • Reduces reliance on electricity grids, lowering operational costs.
  • Offers consistent functionality in remote areas.
  • Minimizes carbon footprints associated with traditional wired systems.

Example: Solar-powered video surveillance systems equipped with energy-efficient batteries can operate continuously, even in low-light conditions.

Energy-Efficient Hardware

The Innovation: Modern security equipment, such as LED-powered floodlights, low-power sensors, and energy-saving access control systems, are designed to consume less energy. Replacing traditional lighting with LED solutions in surveillance systems significantly reduces energy usage. LED lights offer longer lifespans and lower maintenance costs, aligning with eco-friendly objectives.

Benefits:

  • Lower utility bills and reduced environmental impact.
  • Extended lifespan of equipment due to advanced energy management.

Example: Smart lighting systems that activate only when motion is detected, significantly cutting down unnecessary energy use.

Biodegradable and Recyclable Materials

The Innovation: Security products such as fencing, bollards, and barriers are now being made from biodegradable or recyclable materials without compromising durability.

Benefits:

  • Reduces waste during replacements or upgrades.
  • Promotes circular economy practices in the security sector.

Example: Barriers made from recycled plastics or biodegradable composites that offer the same strength as traditional materials.

Remote Monitoring to Reduce Travel Emissions

The Innovation: Cloud-based security systems enable remote monitoring and management, reducing the need for on-site visits by security personnel.

Benefits:

  • Reduces travel-related emissions.
  • Enhances efficiency with real-time alerts and centralized control.

Example: Security firms offering remote patrol services via drones or AI-driven surveillance systems.

Green Building Certifications for Security Integration

The Innovation: Incorporating eco-friendly security solutions into buildings aiming for LEED (Leadership in Energy and Environmental Design) or similar certifications. A 2023 survey revealed that nearly 23% of physical security professionals anticipate manufacturers will adopt green practices to add value or differentiate themselves. Additionally, around 22% expect stricter government regulations to promote sustainability and advancements in technology making greener products more accessible.

Benefits:

  • Aligns security measures with sustainable architecture goals.
  • Increases property value and appeal for environmentally conscious stakeholders.

Example: Installing smart locks, renewable-powered security gates, and energy-efficient HVAC-integrated monitoring systems in green-certified buildings.

Challenges and Solutions

While eco-friendly security systems offer numerous benefits, challenges such as higher upfront costs, limited technology awareness, and the need for specialized maintenance can hinder adoption.

Solutions:

  • Government incentives and tax breaks for sustainable infrastructure.
  • Partnerships between security firms and green technology companies.
  • Educating businesses on the long-term cost and environmental benefits of green security alternatives.

Adopting sustainable security solutions is no longer just an ethical choice but a business imperative in today’s eco-conscious world. By integrating green innovations, the physical security industry can contribute to environmental preservation while maintaining high standards of safety and protection.

Not sure where to begin? Give us a call.

Facial Authentication vs. Facial Recognition: Understanding the Differences and Applications

By Gina Stuelke, CEO of Kenton Brothers

Facial Authentication vs. Facial RecognitionBiometric technologies have gained immense popularity for their convenience and enhanced security. Among these technologies, facial authentication and facial recognition stand out as two of the most discussed and applied innovations. While the terms are often used interchangeably, they refer to distinct processes and serve different purposes.

In this blog post, we’ll break down the differences between facial authentication and facial recognition, their underlying technology, and their real-world applications.

What is Facial Authentication?

Facial authentication is a biometric verification process where a system compares the face of a user to a pre-stored image (or template) to confirm their identity. This technology is primarily used in situations where a user must prove they are who they claim to be, such as when unlocking a smartphone, accessing a secure area, or logging into a banking app.

How it Works:

  1. Enrollment: The user enrolls their face into the system by scanning it, typically with a camera. This creates a template, which is a mathematical model of the facial features.
  2. Comparison: When the user attempts to access the system again, their face is scanned in real-time and compared to the stored template.
  3. Matching: If the live scan and stored template match within a certain threshold, the user is authenticated.

Key Features:

  • One-to-One Comparison: It compares a user’s face against their own stored template, confirming their identity.
  • Security: It is typically used in secure environments where users need to prove their identity (e.g., smartphones, banking apps).
  • User Control: Users usually initiate the process and consent to the comparison.
  • Common Applications:
    • Smartphone unlocking (e.g., Apple’s Face ID)
    • Secure access to apps and services (e.g., banking apps)
    • Physical security systems (e.g., building access)

What is Facial Recognition?

Facial recognition is a broader technology used to identify or verify a person from an image or video in a database or a public setting. Unlike facial authentication, facial recognition often works without the active involvement or consent of the individual and can be used in surveillance or identification tasks.

How it Works:

  1. Image Capture: A camera or video feed captures the face of a person in real-time or from a photograph.
  2. Feature Extraction: The system extracts facial features from the image and creates a biometric template.
  3. Database Search: The system compares the facial features to those in a large database to find a match.
  4. Identification or Verification: If a match is found, the person is identified or their identity is verified. If no match is found, they remain unidentified.

Key Features:

  • One-to-Many Comparison: Facial recognition systems compare a person’s face against many stored templates in a database.
  • Surveillance and Public Use: It’s often used in public spaces for surveillance, identifying individuals without their active participation.
  • Privacy Concerns: Since individuals may not know when their face is being scanned, the technology has raised privacy and ethical concerns.
  • Common Applications:
    • Law enforcement and criminal identification
    • Airport security and border control
    • Retail and commercial surveillance
    • Marketing and customer analytics (e.g., identifying returning customers)

Key Differences Between Facial Authentication and Facial Recognition

Facial Authentication

Purpose: To verify an individual’s identity
Comparison Type: One-to-one comparison (individual vs. stored template)
User involvement: Requires user participation
Security vs. Convenience: Primarily for security (e.g. unlocking devices)
Privacy concerns: Lower (user initiates the scam)
Common User Cases: Smartphone authentication, banking apps Law enforcement, public surveillance, marketing

Facial Recognition

Purpose: To identify or recognize individuals in a crowd
Comparison Type: One to many comparison (individual vs. database)
User involvement: Can be passive and without user consent
Security vs. Convenience: Primarily for identification tracking
Privacy concerns: Higher (can be used without user consent)
Common User Cases: Law enforcement, public surveillance, marketing

Privacy and Ethical Considerations

While both technologies offer undeniable benefits, they raise important privacy concerns, particularly facial recognition. Since facial recognition can be used without the knowledge or consent of the individual, it poses potential risks related to surveillance and the tracking of individuals in public spaces. Many governments and organizations are still working to strike a balance between the benefits of these technologies and the protection of individual privacy. On the other hand, facial authentication, which requires user consent and involvement, is generally considered less invasive, as it is used for secure access to personal devices or services.

Facial authentication and facial recognition are two powerful biometric technologies with distinct purposes and applications. Facial authentication is typically used to verify a user’s identity for security purposes, while facial recognition is used to identify individuals from a crowd or a database. Understanding these differences is crucial, especially as both technologies continue to evolve and become more integrated into our daily lives.

Whether you’re concerned about privacy, security, or convenience, it’s essential to stay informed about how these technologies are being used and regulated. We are here to guide you, give us a call.

Unlocking the Future: What’s next in commercial security?

By Gina Stuelke, CEO of Kenton Brothers

What’s next in commercial security?Over the last decade, we’ve experienced two major types of convergence: Physical security and IP networks, and then came Physical security and Cyber security.

The next major convergence in commercial security technology is likely to involve unified AI-driven platforms that seamlessly integrate cybersecurity, physical security, and IoT (Internet of Things) systems.

This would bring together several trends and advancements:

1. AI-Powered Threat Detection and Response

  • Predictive Security: AI models capable of forecasting potential breaches or attacks based on behavioral analytics. This goes beyond reactive measures, using machine learning to detect anomalies before an event occurs.
  • Autonomous Systems: Drones, robotic surveillance, and even autonomous security guards controlled by AI could patrol areas, responding to security incidents in real time without human intervention.

2. Cyber-Physical Fusion

  • The lines between cybersecurity and physical security will blur further. IoT devices (e.g., smart cameras, connected door locks) will not only detect physical breaches but also monitor network vulnerabilities. This creates a multi-layered defense against both digital and physical threats, closing gaps between the two domains.
  • Zero Trust Architecture: Every device or person accessing a system will need continuous verification, whether for physical entry or access to sensitive digital resources, reducing potential attack vectors.

3. Blockchain for Secure Authentication

  • Blockchain technology could revolutionize identity management, ensuring tamper-proof access control across various systems. It will allow for decentralized, secure authentication for all connected devices and users, ensuring data integrity and eliminating single points of failure.

4. Edge Computing for Faster, Localized Response

  • Instead of relying on the cloud, edge computing will allow security devices to process data locally for faster threat response. For example, a surveillance camera would be able to identify a security risk and trigger an alert immediately, without needing cloud processing.

5. Biometric and Behavioral Authentication

  • Beyond facial recognition, systems will start analyzing biometric and behavioral traits in real-time. This could include gait analysis, heart rate, or even brainwave patterns for security clearance, adding another layer of complexity and accuracy in authentication.

6. Cloud-Native Security Systems

  • The shift to cloud-native security infrastructures will continue, offering scalable and flexible solutions. Centralized AI will analyze and manage security systems across multiple physical locations, with a focus on real-time, remote management.

7. Quantum-Resistant Cryptography

  • With the advent of quantum computing, traditional cryptographic systems will become vulnerable. The next convergence will likely involve quantum-resistant encryption to protect sensitive data and communication channels in both digital and physical security networks.

8. Human-AI Collaboration in Security

  • Rather than replacing human security professionals, AI will act as an augmentation tool. AI systems will flag threats and provide suggestions, while humans maintain decision-making roles in high-stakes scenarios.

9. Augmented Reality (AR) in Security Operations

  • AR-enhanced interfaces will be used by security professionals for real-time threat visualization, allowing them to view live data, camera feeds, and analytics through wearable devices like AR glasses, streamlining responses during security breaches.

10. Privacy-Enhancing Technologies

  • As surveillance expands, privacy-preserving technologies (such as homomorphic encryption or differential privacy) will grow in importance to balance security needs with individual privacy concerns, ensuring that security doesn’t compromise personal data rights.

This convergence would result in unified, intelligent, and proactive security ecosystems that can address an increasingly sophisticated range of threats, blending the digital and physical worlds with advanced AI and decentralized technologies. If you could use help navigating the always changing landscape of commercial security, give us a call. We are here for you.

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.

By Gina Stuelke, CEO of Kenton Brothers 

Top 10 ways Kenton Brothers is using AI to protect people, property and possessions.In line with our core values of continuous learning, innovation and customer focus, as a physical security integrator, Kenton Brothers is increasingly leveraging AI technology to enhance security operations, improve efficiency, and deliver advanced solutions to our clients.

Here’s how we’re putting AI to work:

1) AI-Powered Video Surveillance

  • Intelligent Video Analytics: AI algorithms can analyze video feeds in real-time to detect suspicious behaviors, unauthorized access, or potential threats. For example, AI can identify intruders, recognize objects (such as weapons), and track movements.
  • Facial Recognition: AI enables automated identification of individuals based on facial features, allowing for efficient access control and security checks.
  • Behavioral Analysis: AI can detect abnormal behaviors, such as loitering, aggressive movements, or unauthorized gatherings, alerting security personnel to potential risks.

2) Predictive Maintenance and Monitoring

  • Proactive System Maintenance: AI-driven analytics help predict when security equipment (such as cameras or alarms) might fail, enabling integrators to schedule maintenance before malfunctions occur. This reduces downtime and enhances system reliability.
  • Monitoring IoT Devices: AI helps manage and monitor IoT-connected security systems, ensuring these devices remain secure and functional.

3) Access Control and Authentication

  • Biometric Authentication: AI is used for facial recognition, fingerprint scanning, and iris detection, ensuring only authorized personnel can access secured areas. AI enhances accuracy by learning and improving identification over time.
  • Behavioral Biometrics: AI systems can analyze users’ behavioral patterns (such as typing speed or gait) to authenticate users dynamically, adding another layer of security beyond traditional credentials.

4) Cybersecurity and Threat Detection

  • AI for Intrusion Detection: AI helps monitor digital networks tied to physical security systems, identifying potential cyber threats such as hacking attempts or malware. Physical security integrators use AI to strengthen the digital defenses of connected security devices, preventing breaches.
  • Anomaly Detection: AI can flag abnormal behaviors in security networks, such as unexpected traffic patterns or unauthorized access attempts, allowing integrators to address cybersecurity vulnerabilities before they lead to physical security breaches.

5) Automation of Security Tasks

  • Automated Monitoring and Reporting: AI automates routine security tasks like monitoring large-scale environments or compiling daily security reports. This allows human operators to focus on more complex tasks.
  • Drones and Robotics: AI-powered drones and robots are being deployed to patrol large areas autonomously, monitoring for security risks, and reporting anomalies back to a central system.

6) Improved Incident Response

  • AI-Powered Threat Response: When AI detects a security breach or potential risk, it can trigger automated responses like locking doors, alerting security personnel, or deploying drones. AI systems can prioritize incidents based on severity, ensuring that the most urgent issues are addressed first.
  • Integrated Security Systems: AI helps integrate various security systems (video surveillance, access control, alarms) into one platform, providing a holistic view of security events and streamlining incident response.

7) Data-Driven Insights

  • Enhanced Decision-Making: AI helps physical security integrators analyze vast amounts of data from multiple sources (cameras, sensors, access logs) to provide actionable insights. This can include identifying vulnerabilities, optimizing security layouts, or predicting future threats.
  • Heat Mapping: AI can create heat maps of physical spaces based on foot traffic patterns. Clients can use these insights to improve security placement and better understand how spaces are being used.

8) Real-Time Alerts and Notifications

  • Smart Alerts: AI systems can provide real-time notifications to security teams based on detected risks or rule violations. Alerts are more precise, reducing false positives and allowing security teams to respond quickly and efficiently.

9) AI-Driven Command Centers

  • Centralized Management with AI: AI is used to streamline the operations of command centers where multiple security feeds are monitored. AI processes data and can escalate incidents automatically, helping integrators improve response times.
  • Virtual Assistants for Command Centers: AI chatbots or virtual assistants can help operators by providing quick access to relevant information, issuing commands, or managing routine tasks like activating or deactivating systems.

10) Cost Efficiency and Scalability

  • Optimized Resource Allocation: AI allows integrators to optimize the placement and use of security personnel. For example, it can flag areas of concern, allowing security officers to focus on specific zones rather than patrolling areas that don’t need attention.
  • Scalability: AI-driven systems are more scalable than traditional security setups. As security needs grow, AI can manage and analyze larger datasets without a proportional increase in manpower, making security operations more cost-efficient.

Artificial Intelligence is transforming physical security by automating and enhancing traditional  security processes, improving threat detection, and enabling smarter, more proactive security solutions. Kenton Brothers is able to offer more advanced and efficient systems that better protect assets and people while reducing costs and human labor.

If you are ready to take advantage of all that AI is bringing to commercial security, please give us a call. Let’s work together to create solutions to your security concerns!