Door Naming Conventions – Keeping Businesses Organized and Secure

By Neal Bellamy, IT Director at Kenton Brothers

Door Naming ConventionsOne of the most critical aspects of planning a commercial security system design for a facility is organization. Taking the time to get the details right ensures that all users of the system easily understand how the various components and functions will work together. One of the topics that can cause a lot of confusion is how to verbally reference a specific door inside your building(s).

Depending on the size and nature of your business, an organization can end up having to secure a lot of doors!

Part of the KB Advantage is that we take pride in creating custom solutions for our clients. And that’s not marketing speak… We actually enjoy the process of working with you to design customized commercial security systems that will protect your people, property and possessions. We also like partnering with you to maintain or update your existing commercial security systems. Knowing that employees feel safer, and security officers have more confidence in their system, puts a smile on our face.

Regardless of the size of your access control system, it’s a good rule of thumb to have a naming convention established for the various doors in your system. For smaller systems, this is as easy as naming a door Main Entry or Employee Door. But what about when we’re talking about a system that has 10, 20, or even 500 doors? This is where you will see the value of our 127 years of experience providing commercial security solutions to businesses nationally.

A Conversation with Vince

Door Naming ConventionsI sat down with one of our employees, Vince Gelei, to learn more about our best practices for door naming conventions. Vince is experienced in the process of building and programming the many access control systems we provide for our customers.

Sometimes, it’s hard to put into perspective the number of devices that are involved in the access control programming for a single door. Without having some structure, the system can become convoluted and hard for both the end user and integrator to operate and maintain. Vince provided some great insight on the key factors for developing such a framework within an access control system:

  • End User’s Security Capacity – Determining the technical level of our customers plays a big part in system design. (We can’t provide a solution that’s hard for our customers to understand and use.) We want to make sure the final naming conventions will be an intuitive reference for the end user. This is the first priority in system programming.
  • Access Control System – The commercial security system that the customer has chosen also plays a big part in how we set up naming conventions. The capabilities of their system dictate what we can and cannot do when setting up doors and their naming structure.
  • Territory or Location – We would want to set up a City Reference if you have a national presence. For a specific region all the way down to a single building, we would set up a Building Reference. (These terms are the first step in verbally referencing a specific door.)
  • Total Door Count of Site – When we know ahead of time how many doors are on site and how they function, we can document this in your access control system. (This is not a feature supported in all access control platforms. This is another reason why our system design process is critical.)
  • Site Floor Plans – With existing floor plans we can document the solution for quick reference.
  • Door Numbers – Do the facilities have pre-established door numbers? If your building already has door numbers, we would simply leverage that convention.
  • Potential for Growth – Is this just the first phase of implementing a commercial security solution for your organization? If so, we want to plan for future phases and the growth of your organization. Trying to develop this afterwards can be a nightmare!

Door Naming ConventionsVince also goes on to explain, “A door could be named doors, access points, portals, etc. in your existing system. We help our customers rename them in a way that end users operating the system will be able to quickly identify the physical location of any door. Of course, with larger sites there is more complexity. We work with the end user to create a site-specific nomenclature that is typically composed of literal door numbering, but also acronyms to codify and differentiate the different locations.”

The overall recommendation from Vince is that door naming is a small but important detail when planning out your security system.

At Kenton Brothers, we have the experience of working closely with our customers and partners to design and implement customized commercial security solutions. Whether it’s time for you to plan and build out your first solution or update your existing security systems, give us a call. We would love to help you.

Does your access control have a WOW factor?

By Neal Bellamy, IT Director at Kenton Brothers

Does your access control have a WOW factor?Access control is typically a Ho-Hum discussion. Who gets access to your doors? When during the day do they get access? Do you want pictures on your badges? What doesn’t get discussed often is how access control can make it easier to manage your facility. Ease of use is vastly different across access control platforms. Your decision on access control software can significantly affect how you manage your facility!

First, let’s start with site plans, or maps. 

Suppose you have someone that is watching your facilities, like a guard, SRO, or facility manager. In that case, a site plan can give you a visual representation of your facility and its security at a glance. For instance, in Gallagher, the site plan can show you if all the doors are open or closed, locked or unlocked, the last person who scanned through the door, whether it has been propped open or even forced open.

Does your access control have a WOW factor?If your Gallagher system is integrated with your camera system, the site plan will show you nearby cameras on the site plan. Likewise, if the intercom system is connected, the site plan allows you to talk to the person at the intercom, all through one interface.

Since Gallagher has a built-in intrusion system, showing the alarm status as well as arming and disarming can all be done through the site plan as well. Finally putting it all together, for facilities that are actively monitoring their system and you have an alarm where a door is forced open, or any other type of event, the alarm manager can show you on the map where the event is taking place, any cameras in the area, whether the alarm is armed and the last person who swiped through the door.

Although a common phrase at Kenton Brothers is that security and convenience don’t mix, mobile credentials are the exception.

Does your access control have a WOW factor?From a convenience perspective, mobile (or sometimes called Bluetooth) credentials can be issued easily through a web portal or software via text or email. Mobile credentials can be issued from hours and hundreds of miles away. From a security perspective, mobile credentials are already more secure than most physical cards. Usually, the cards have to be activated by the user, which makes cloning harder. In some instances, the credential is tied directly to the access control system and has a more unique identifier. Then on top of the already more secure credential, they normally can be combined for a multi-factor authentication like face id, fingerprint, or pin number.

Mobile credentials come in a couple of flavors, two independent systems for mobile credentials and access control, which is a little less convenient, and one combined, or integrated, system which is easier to use. Gallagher offers all of these convenience and security features. Furthermore, five mobile credentials come with every system so you can try it for yourself!

The next WOW! factor component is a mobile app to control your system from afar.

Does your access control have a WOW factor?Mobile apps are split fairly well among access control systems. Systems that have been around for decades are struggling to convert their very robust systems to also include a mobile app that has basic functionality. Newer systems that might have only been around for 5-8 years may only have a mobile app, but lack deeper access control features you might need. Gone are the days when our workforce comes in at 9 am, takes an hour’s lunch, and leaves the office at 5 pm.

People are working the hours that work for them, their family, and their business. This means visitors might come at all hours, people could get locked out while walking their dogs or stepping out for a late-night snack. A Mobile app gives authorized people the ability to allow approved staff into the office from anywhere with internet access. Good mobile apps also allow viewing and disabling cardholders as well as arming and disarming alarms.

Gallagher offers all of these features and even adds an evacuation process where you can account for everyone quickly, in case of an emergency. Just like mobile credentials, Gallagher includes one mobile app connection for each system.

Does your access control have a WOW factor? Does your access control have a WOW factor?

Gallagher is releasing new features constantly.

Does your access control have a WOW factor?There are some new features that we haven’t been able to use yet, but look great. The first is a VoIP/SIP server. Without getting too technical, most IP intercoms now are basically IP phones installed next to a door. Each have basic capabilities to call another IP phone. The Gallagher implementation offers the ability to answer intercoms, directly through the Gallagher app. While this won’t replace full integration of intercom systems, it will start to replace intercom integration where the end-user only needs a few intercoms.

The next new feature is a client web application, this new application allows users to connect with Gallagher over a web interface, rather than the full client or mobile app.

If you want to know more about how you and your company can take advantage of these WOW factors, give us a call!

Anti-Passback and Anti-Tailgating: Do you know who is in your building?

By Neal Bellamy, IT Director at Kenton Brothers

Do you know who is in your building? Do you know where everyone is located when they are in your building?

To help companies answer these questions, we use access control solutions. (As the name implies, these solutions control access to buildings.) When configuring these systems, we decide which people get into the building, which doors they can use and the times that they are able to open the door. Access cards are a key component of these systems.

Access Card Skimming Devices

Anti-Passback and Anti-TailgatingThere are reasons why you might want to increase security or safety by adding more features to your current access control system. Why? Copying and emulating an access card has become easier, due to new technology like a flipper zero and other skimming devices.

The best defense against copying a card is to use a card technology that has not yet been hacked. You also need to use encrypted communication between the reader and the control panel. (Both have been talked about before in my previous blogs). However, sometimes the upgrade path can take a long time to implement and/or be expensive depending on how large your system is and how old it is. Another way to guard against skimmers might be to ensure a card has only been used once to gain entry.

Anti-Passback

Anti-Passback and Anti-TailgatingAnti-passback is the access control term when we want to prevent someone from entering a door and then passing back the card to another person, who then uses the card to enter. Most access control systems have that technology available. When this feature is enabled, you also know when a person is leaving the area. If you know when they are in the area and you know when they leave an area, then you also know where they shouldn’t appear in the building. In other words, if the cardholder is already in the building, you should not grant access to the building again.

The reason an employee might try to get into the building again is because they loaned their card out, or because it was copied. Anti-Passback also provides more safety. If an emergency happens, you also know who was in the building or area at the time of the event. If you don’t have Anti-Passback enabled, you might know that a person came in that morning, but would not know that they left for lunch or an appointment during a specific timeframe.

To build on this example, imagine a multi-building company or a company located across multiple cities. If someone badged into the downtown campus and has not badged out, then they can’t possibly be at the uptown office. If they were in the New York office at 8am, there is no way they could be badging into the L.A. office at 9am.

Anti-Tailgating

You can also define areas within areas. You might have a building perimeter, then a lab inside, and maybe even a hazardous storage area inside the lab. You can set the rules so that they cannot enter the storage area unless they are in the lab first; You can’t enter the lab until they are in the building; and so on. (This technically is called Anti-Tailgating, but goes hand-in-hand with Anti-Passback.)

There are a few reasons you might want to know in real-time who is in your building. Anti-Passback and Anti-Tailgating can improve security by only allowing one person to be in one place, improve safety by knowing that someone was in the building during an emergency, and even help you understand where in the building someone is located.

We are experts at solving hard problems, if you have a unique situation, please let us help.

Commercial Security: Redundancy Servers and Why They Matter

By Ryan Kaullen, Field Services Manager at Kenton Brothers

Commercial Security: Redundancy Servers and Why They MatterRedundancy servers are put in place to keep things up and running in the event of a hardware failure. The engineering definition of redundancy is, “the inclusion of extra components which are not strictly necessary to functioning, in case of failure in other components.”

Redundancy servers can be put in place for access control systems and commercial video surveillance systems. There are also a couple of types of redundancy server options called “hot” and “cold”. In this blog, we will talk about these types and options and how they work to make your commercial security system more resilient.

Access Control Redundancy Server

Access control systems already have some redundancy built into them. The door controllers have on board memory, so they will continue to operate even if the main server fails. However, any changes that would need to be made to the card holders or door schedules in the event the main server fails can’t happen until the server is repaired. This is where a redundancy server for the access control system comes into play.  Depending on if you have a hot or cold redundancy server (we will discuss the differences later in this article) you will see either a shortened down time or almost no down time.

Commercial Video Surveillance System Redundancy Server

Commercial Security: Redundancy Servers and Why They MatterCommercial video surveillance systems rarely have server redundancy. If a server fails, the cameras will no longer be recording. Some management systems have capabilities for server failover built into the software. Unlike with an access control redundancy server where you have the hot or cold option, a video redundancy is likely going to be a hot redundancy server. If the initial server goes down, the redundancy server starts recording the video streams. Obviously, the big win in this scenario is that you mitigate the risk of lost video when you have a hardware failure at the worst possible time (when a security event is happening).

Hot and Cold Redundancy Server Options

A “Hot” redundancy server is one that runs in parallel with the main server. If the main server goes down, the redundancy server immediately picks up when the other one failed. This is usually a more expensive option as there can be more licenses, hardware, and integration needed so that it is running in parallel. The major pro here is that failover times are measured in milliseconds and after the initial set up requires no intervention from an IT team.

Commercial Security: Redundancy Servers and Why They MatterA “Cold” redundancy server is one that is set up and has the systems already installed, but is not running in parallel. While it is ready to be put into production if the main server fails, there is some setup that has to occur. At minimum, restoring services requires booting up the redundancy server. However, other requirements might include installing the latest backup of card holders, schedules, routing all devices to the new server, getting the IT team and daily operations team involved. While all of those things are happening, the primary server is down. No changes to the configuration can be applied across an access control system and no video streams are being recorded until the cold redundancy server is brought online.

Having back-ups in place for any commercial security system is critical. Redundancy servers play a huge role in making that a reality. Our security consultants will work with your organization to help you identify the right redundancy server option for your facility. If you would like to know more, please reach out to us today to start a discussion on how to provide redundancy for your systems.

Enhancing Physical Security with Kenton Brothers Systems for Security CSEIP Certified Engineers

By David Strickland, Vice President of Kenton Brothers

CSEIP Certified EngineersFederal Agencies are continuously seeking robust solutions to safeguard their assets and personnel. Physical security plays a pivotal role in this endeavor, encompassing a range of measures to Protect People Property and Possessions from unauthorized access or harm. Among these measures, Identity, Credential, and Access Management (ICAM) systems integrated with Physical Access Control Systems (PACS) have emerged as a cornerstone for ensuring comprehensive security solutions. In this blog, we delve into the significance of having Certified Security Engineer Identity Professional (CSEIP) certified engineers managing ICAM PACS and explore real-world use cases across government agencies.

Understanding ICAM PACS:

ICAM PACS integrates physical access control with identity management, enabling organizations to efficiently manage and control access to their facilities. These systems authenticate and authorize individuals based on their credentials, ensuring that only authorized personnel can enter designated areas. ICAM PACS solutions often encompass a variety of technologies such as smart cards, biometrics, and multi-factor authentication, providing layers of security to mitigate risks effectively.

Benefits of CSEIP Certified Engineers:

CSEIP Certified EngineersCSEIP certification is a testament to an engineer’s expertise in designing, installing, and maintaining advanced security systems, including ICAM PACS. Expertise in ICAM PACS Integration: CSEIP certified engineers possess in-depth knowledge of ICAM PACS technologies and standards, ensuring seamless integration with existing security infrastructure. Their expertise enables organizations to optimize system performance while maintaining compliance with regulatory requirements.

By leveraging the expertise of CSEIP certified engineers, organizations can implement robust security measures tailored to their specific needs. From designing access control policies to configuring authentication mechanisms, these professionals ensure that security vulnerabilities are effectively addressed, bolstering overall protection.

With CSEIP certified engineers leading the way, organizations can mitigate the risk of security breaches and unauthorized access attempts. These experts implement industry best practices and deploy advanced security features to fortify ICAM PACS against evolving threats, safeguarding critical assets and sensitive information.

CSEIP certified engineers possess the skills to diagnose and resolve issues promptly, minimizing downtime and ensuring uninterrupted security operations. Their proactive approach to maintenance helps organizations identify potential vulnerabilities early on, preempting security risks before they escalate.

Use Case Scenarios:

Let’s explore how government agencies can benefit from having CSEIP certified engineers managing ICAM PACS:

Department of Defense (DoD):

CSEIP Certified EngineersThe Department of Defense operates a vast network of facilities and installations worldwide, each requiring stringent access control measures to safeguard classified information and sensitive equipment. By employing CSEIP certified engineers to manage ICAM PACS, the DoD ensures that only authorized personnel gain access to restricted areas. These professionals design and implement multifactor authentication systems, incorporating biometric verification and smart card technology to enhance security while streamlining access for authorized personnel.

Federal Bureau of Investigation (FBI):

As the principal federal law enforcement agency, the FBI relies on robust security protocols to protect its headquarters, field offices, and forensic laboratories. CSEIP certified engineers play a crucial role in designing and maintaining ICAM PACS solutions tailored to the FBI’s specific security requirements. By deploying advanced authentication mechanisms and intrusion detection systems, these professionals help safeguard sensitive investigative materials and ensure the integrity of the agency’s operations.

Department of Homeland Security (DHS):

The Department of Homeland Security oversees critical infrastructure and coordinates efforts to protect the nation from security threats. CSEIP certified engineers support DHS initiatives by implementing comprehensive ICAM PACS solutions across various agencies and facilities. These experts collaborate with stakeholders to design access control policies aligned with DHS mandates, enhancing situational awareness and emergency response capabilities.

By entrusting ICAM PACS management to CSEIP certified engineers, organizations can reap the benefits of enhanced security, reduced risk, and streamlined operations. As demonstrated through real-world use cases in government agencies, the expertise of CSEIP certified engineers is indispensable in safeguarding critical assets and ensuring the integrity of physical security systems.

Kenton Brothers Systems for Security is proud to offer our services to our Federal Agency partners.
Please give us a call today to see how we can help support your organization!