The Rise of AI in the Physical Security Industry

By David Strickland, Vice President of Kenton Brothers

The Rise of AI in the Physical Security IndustryAt Kenton Brothers Systems for Security, we are always focused on Innovation. We have a great saying: Innovate or Die

The physical security industry is undergoing a major transformation as artificial intelligence (AI) becomes an integral part of surveillance, access control, and threat detection systems. AI-driven security solutions are enhancing the effectiveness of security personnel, improving response times, and reducing operational costs. As organizations seek more proactive approaches to risk mitigation, investments in AI technology continue to surge across various sectors, including corporate enterprises, critical infrastructure, law enforcement, and public safety.

According to market research, the global AI spend in the security market is expected to reach $71 billion by 2027, growing at a CAGR of over 23%. Major players in the industry are investing billions in AI-powered surveillance, access control, and cybersecurity solutions, recognizing the immense potential of these technologies to reshape security operations.

AI-Powered Video Surveillance

AI is revolutionizing video surveillance by improving object recognition, behavior analysis, and real-time anomaly detection. Companies like Hanwha Vision and Axis Communications are embedding deep learning algorithms into their cameras, allowing for advanced analytics such as facial recognition, license plate recognition, and suspicious activity detection.

Traditional security systems often rely on motion detection, which can trigger numerous false alarms due to environmental factors like shifting shadows, animals, or weather conditions. AI-powered analytics refine this process by differentiating between routine activities and actual security threats. By leveraging neural networks and machine learning, AI can accurately identify threats such as unauthorized intrusions, abandoned objects, or aggressive behavior. As a result, security teams can prioritize real incidents and respond more efficiently, minimizing downtime and improving security operations.

Additionally, AI-enhanced surveillance systems can integrate with law enforcement databases, allowing for real-time identification of persons of interest, missing individuals, or stolen vehicles. This level of automation significantly enhances the ability to act quickly in high-risk scenarios.

Predictive Threat Detection and Incident Prevention

One of the biggest advantages of AI in security is its predictive capabilities. AI algorithms analyze vast amounts of historical data to identify patterns and predict potential security breaches. By integrating AI with physical security measures, organizations can take preventive action before incidents occur, reducing risks and enhancing preparedness.

For example, AI-driven behavior analytics can detect unusual activity in high-security areas, such as loitering near restricted zones or unauthorized access attempts. Advanced AI models can factor in variables like time of day, frequency of movement, and crowd density to determine whether an individual’s behavior is suspicious. Security systems can then issue alerts to personnel, allowing them to intervene before a breach happens.

AI-powered analytics can help in monitoring large-scale events such as concerts, sports games, and public gatherings, identifying crowd surges or potential stampedes in real-time. This proactive approach allows security teams to take action before incidents escalate into critical situations.

AI in Access Control Systems

The Rise of AI in the Physical Security IndustryAI is also reshaping access control by introducing biometric authentication, intelligent access policies, and adaptive security responses. Facial recognition, fingerprint scanning, and iris detection—powered by AI—are replacing traditional keycards and passwords, offering a more secure and frictionless experience for employees and visitors.

AI-driven access control systems can adapt to evolving security threats by learning user behaviors and flagging anomalies. If an employee suddenly tries to access a restricted area at an unusual time, the system can trigger additional authentication steps or alert security personnel. These AI-powered systems can also integrate with databases to enforce blacklists and whitelist protocols, enhancing perimeter security.

Additionally, AI-enhanced access control can be used in conjunction with workforce management, allowing for more efficient tracking of employee attendance, automated credential revocation for terminated employees, and secure remote access for approved personnel.

AI-Driven Robotics and Drones

The deployment of AI-powered security robots and drones is becoming more common in large-scale facilities, such as airports, warehouses, and corporate campuses. These autonomous systems can patrol designated areas, analyze footage in real-time, and even interact with potential threats using voice commands or alerts.

Security robots equipped with AI can identify suspicious behavior, recognize unauthorized personnel, and conduct temperature scans in high-risk areas. AI-driven drones, on the other hand, provide aerial surveillance, offering a broader perspective of security perimeters, which is particularly useful for securing large or remote locations where manual patrols are less effective.

Furthermore, these AI-powered security agents can work around the clock, reducing the need for human patrols while maintaining a consistent level of monitoring. Some of the latest models are equipped with environmental sensors that detect hazardous materials, making them valuable assets for critical infrastructure protection.

AI and Cybersecurity Convergence

As physical security systems become more connected, the risk of cyber threats increases. AI is playing a crucial role in bridging the gap between physical and cybersecurity by identifying vulnerabilities and mitigating risks in real time. AI-driven security platforms use behavior-based analytics to detect unauthorized access to surveillance networks, monitor unusual login attempts, and prevent data breaches.

AI-enhanced threat detection software can scan large amounts of data to recognize malware, ransomware, and phishing attempts, protecting security infrastructures from cyberattacks. By integrating AI with both cybersecurity and physical security systems, organizations can establish a more holistic security approach that safeguards against both digital and physical threats.

Security Information and Event Management (SIEM) platforms and Security Orchestration, Automation, and Response (SOAR) solutions are increasingly using AI to correlate events across different security layers. This ensures a more comprehensive security posture by automatically identifying, prioritizing, and responding to both cyber and physical security incidents in real time.

Future Outlook: The Growth of AI in Security

The integration of AI into the physical security industry is only expected to grow. Market analysts predict that investments in AI-driven security solutions will continue to rise as businesses, government agencies, and critical infrastructure providers seek more efficient ways to protect assets and people.

As AI technology evolves, new applications such as real-time audio threat detection, emotion recognition, and AI-enhanced forensic analysis will become more common. AI will also play a key role in autonomous security decision-making, reducing the reliance on human intervention and improving response times in emergency situations.

Future advancements in AI will also lead to more sophisticated autonomous security solutions, including AI-powered facial recognition gates for seamless access control, smart city surveillance integrations, and advanced threat prediction models that adapt in real time.

AI is Reshaping Physical Security

AI is reshaping the physical security landscape by providing smarter, faster, and more accurate security solutions. From advanced video analytics to predictive threat detection, biometric authentication, and AI-driven robotics, the industry is embracing a new era of security innovation. Organizations investing in AI-powered security solutions are not only improving their defenses but also setting the foundation for a future where security is more proactive, adaptive, and intelligent than ever before. The rapid evolution of AI in security is setting the stage for a safer world, where threats are detected before they occur, and response times are reduced to a matter of seconds.

Please give us a call to explore the ways AI can help your physical security systems, policies and procedures.

From Legacy to Leading Edge: A visual journey through the evolution of security technology

From Legacy to Leading EdgeBy Gina Stuelke, CEO of Kenton Brothers

Back in 2008, our industry experienced a significant convergence event joining physical security and IP based networks onto a common platform. This was a major shift away from the disparate systems we had become accustomed to. That seems like such a long time ago! Today, we are involved in another convergence event involving physical security and cyber security.

The two pyramids in the images below represent the technology stacks used by Kenton Brothers, with each layer reflecting the progression of security technologies and how our offerings have elevated over time.

Kenton Brothers 2008 Technology Pyramid

Kenton Brothers Systems for Security: Pyramid1. Base Layer (Mechanical Locking Hardware): Traditional, physical locking systems.
2. High Security Cylinders and Masterkey System Implementation: The introduction of advanced physical keys and locks.
3. Legacy and Stand-Alone Access Control and Analog Video Surveillance Systems: Initial electronic security measures, such as standalone access systems, video surveillance and analog technologies.
4. Network-Based (IP) Access Control and Video Surveillance Systems: The shift to internet-based systems, improving remote access and integration.
5. Integration Services: Combining different systems (video, access control, etc.) for better coordination and ease of use.
6. Hosted and Managed Services: Outsourcing and cloud-based security management to external providers.
7. Video Analytics: Using software to analyze video data and identify suspicious activities automatically.

Kenton Brothers 2024 Technology Pyramid

Kenton Brothers Technology Pyramid1. Base Layer (Security Policies and Procedures): Security begins with robust organizational policies and procedures, a foundational aspect in modern security systems.
2. High Security Physical Hardware: Continues from previous physical security technologies but is more sophisticated.
3. Detection: Active detection systems for unauthorized access or incidents (includes sensors, alarms, etc.).
4. Access Control: Advances in access control technology (includes biometric and smart credentials).
5. Video Surveillance: Video monitoring remains central, but with higher resolution, better storage, and cloud integration.
6. Analytics and AI Support: Modern video surveillance includes AI, improving event detection and proactive analysis.
7. Cyber Hardening: Reflects the growing importance of cybersecurity, securing systems from hacking and digital threats.

What are the comparisons in technological advances?

  • Shift from Analog to IP: Over the last decade, analog systems (present in the first pyramid) have largely been replaced by IP-based systems, which allow for higher quality video and easier integration into larger networks.
  • Integration of AI and Analytics: Modern systems (second pyramid) emphasize the use of AI for proactive security management. This shift moves beyond video analytics to AI-supported threat detection, reducing human workload and improving accuracy.
  • Focus on Cybersecurity: The first pyramid lacks any mention of cybersecurity, which has become essential in modern security infrastructures due to the increasing threat of hacking. Cyber hardening in the second pyramid highlights this critical evolution.
  • Increased Use of Cloud Services: The second pyramid also reflects advances in cloud technologies for video storage, processing, and real-time analytics—leading to more flexible, scalable, and manageable systems.
  • Detection Technologies: Detection is more advanced in the second pyramid, likely including smarter sensors and automated systems integrated with AI.

Security systems have evolved from primarily physical and standalone solutions (first pyramid) to highly integrated, AI-driven, and cyber-secure ecosystems (second pyramid). These technological shifts have led to more automated, efficient, and intelligent systems capable of responding to modern-day security threats.

Has your commercial security stack been in place for a long time? It may be time to take a good look to make sure you are keeping up with the aggressive changes in technology. And if you need help, please give us a call!

Introducing KB CYPHY: Cyber Security for Your Physical Security Network

By David Strickland, Vice President of Kenton Brothers

As you may have read – The time is now to secure your networks. CYPHY is a combination of Cyber and Physical security. CISA (Cybersecurity and Infrastructure Security Agency) and DHS (Department of Homeland Security) have published, distributed, and are now looking to regulate critical infrastructure, critical services, state and local municipalities, manufacturers and healthcare companies to follow the guidelines set out in the recent campaign “Resolve to be Resilient”.

As a part of this campaign, they are asking everyone to follow a very simple three step plan:

  • Assess Your Risk. Organizations should identify their most critical functions and assets, define dependencies that enable the continuity of these functions, and consider the full range of threats that could undermine functional continuity.
  • Make a Plan and Exercise It. Organizations should perform dedicated resilience planning, determine the maximum downtime acceptable for customers, develop recovery plans to regain functional capabilities within the maximum downtime, and test those plans under real-life conditions to ensure the ability to operate through disruption.
  • Continuously Improve and Adapt. Organizations should be prepared to regularly adapt to changing conditions and threats. This starts with fostering a culture of continuous improvement, based on lessons learned from exercises and real-world incidents, and evolving cross-sector risks.

To counter the ever-evolving threat landscape, security is not merely about physical fortification; it extends into the digital realm, demanding a comprehensive solution. At Kenton Brothers Systems for Security, we understand the significance of safeguarding both your tangible assets and your digital infrastructure. With our proven reputation in the security industry, we bring you a holistic approach that combines cutting-edge physical security systems that are protected properly from cyber-attacks.

KB CYPHY

KB CYPHYWe are excited to introduce the new KB CYPHY service to lower risk and increase the hardening of your physical security networks.

As with all our projects we begin with assessing the current state of your physical security network. Once we determine where we will need to concentrate our efforts, our certified engineers put together a plan to bring your level of cyber security up to a satisfactory level. Once the plan is agreed on in collaboration with your IT department, we begin the process.

Here are a few of the steps we take to raise your CYPHY security level.

Network Security:

Collaboration is key. During the installation process, we work closely with your IT team to implement measures such as locking switch ports, MAC address reservation, and the enforcement of unprivileged accounts for routine system use.

Password Protection:

In the digital age, password security is paramount. KB CYPHY employs a stringent password policy, ensuring that each password is a unique combination of at least 13 characters, including lower and upper-case letters, numerals, and special characters as a minimum.

Manufacturers Hardening Guides:

Following manufacturers’ hardening guides is a fundamental aspect of our security strategy. KB CYPHY is meticulously configured to minimize vulnerabilities, providing you with a robust defense against potential threats.

Firewall Configuration:

Our pre-configured firewalls adhere to the guidelines specified in the hardening guide. By carefully managing open ports, we reduce the surface area for potential cyber threats, enhancing the overall security of your digital infrastructure.

DMZ Implementation:

Strategic placement of internet-facing servers in a Demilitarized Zone (DMZ), combined with IP filtering for local IPs only, segregates them from your internal network. This additional layer of defense, facilitated by the CYPHY system, protects against external threats.

Quarterly Security Measures:

Security is an ongoing process and must continuously improve and adapt.  Our proactive approach, facilitated by KB CYPHY, includes monitoring Common Vulnerabilities and Exposures (CVEs) and implementing necessary updates quarterly. This ensures that your security infrastructure remains resilient and up-to-date.  These services include:

– Device firmware upgrade
– Hotfix/patch for security VMS/AC software
– Verify Encryption
– Apply OS Patches

Device and Software Maintenance:

Regular maintenance is crucial. Our quarterly routine, facilitated by the CYPHY system, includes firmware upgrades and security patches, with a focus on hotfixes for potential vulnerabilities in our Video Management Systems (VMS) and Access Control (AC) software. Where possible, encryption is enabled to protect data in transit.

Camera Security:

Our camera systems go beyond basic surveillance. Regular port scans, facilitated by the KB CYPHY team, disable unnecessary services and ports (Telnet, FTP, HTTP, SMTP, SSH, Bonjour), minimizing potential attack vectors. Edge storage is encrypted, and unused SD cards are disabled for a comprehensive approach to camera security.

By choosing Kenton Brothers Inc Systems for Security and our advanced CYPHY system, you’re not just investing in physical security; you’re securing the future of your business. Our holistic solution ensures that both your tangible assets and digital infrastructure are fortified against the evolving threats of the modern world.  We invite you to explore how KB CYPHY coupled with robust cybersecurity measures, can be tailored to meet your unique needs.

Subscription Based

KB CYPHY is available now and is an annual subscription based on the size of your system. Kenton Brothers Systems for Security will offer this on every installation and will be a standard minimum moving forward.

It’s time to throw the gauntlet down on open, unsecure networks. Please give us a call if you would like to talk about this offering and how it could help your organization.

Introducing the Kenton Brothers CyPhy Security Plan

By Neal Bellamy, IT Director at Kenton Brothers

CyPhy Security PlanLately we’ve been talking a lot about Cyber Security. As with all types of commercial security, Cyber Security is best implemented as layered defense. In other words, a single key or credential won’t gain access to the entire kingdom. Also, like Physical Security, even a small oversight can become the launch point for a larger attack.

For years, Kenton Brothers has been doing our part to help maintain security on your physical security devices. We use unique, randomly generated passwords for all of your devices. We make sure the firmware is updated at the time of install and implement other industry standard security best practices. While it’s a good start, there were still some gaps. So we are taking it to the next level.

The Kenton Brothers CyPhy Security Plan

Kenton Brothers is introducing our CyPhy Security Plan. Security is not a “set it and forget it” proposition. The security landscape, both Cyber and Physical, is always changing. It must be evaluated and re-evaluated to make sure the greatest number of holes are closed. With the CyPhy Security Plan we will still make sure your physical security systems are set up with the latest software, unique passwords, etc.

With this new program, we will follow the security hardening guides from all manufacturers, lock down all switch ports and ensure firewalls are set up and configured properly. After the initial installation is complete, we will be involved ongoing. We will monitor new releases from the manufacturer and alert you to any critical security related issues for your system. Furthermore, if you have the manufacturer’s software upgrade plan in place, we will remotely upgrade your systems and firmware every 6 months.

Where applicable, the CyPhy Security Plan includes:

• Using unique and randomly generated passwords for each purpose and user
• Upgrading firmware to the latest supported version
• Setting the server firewall to only allow authorized communications
• Locking switch ports to allow only authorized devices
• Monitoring manufacturer’s software for critical security alerts
• Enforcing encrypted communication wherever possible
• Disabling services, applications and ports not being used on devices
• Using unprivileged account for normal system usage
• Enforcing encrypted edge storage
• Filtering communication to local IP addresses only
• Disabling SD card slots not being used
• Following hardening guides from all installed manufacturers

We want the CyPhy Security Plan to dovetail into your existing cyber security plan.

If you have other cyber security initiatives already installed, like MFA, managed firewall, managed global service accounts, VPNs etc., we will help you integrate those into the physical security devices, networks and servers. We will also make suggestions to improve the security and operations of your systems. For example, deploying internet facing servers in the DMZ or connecting the security systems to Active Directory for ease of user management.

If you don’t have a cyber security plan in place, you can rest assured that the physical security devices will be protected and can even use our commercial security best practices to increase the security for your other systems.

Of course, there is no un-pickable/un-hackable lock, and there will never be a perfect defense for cyber attacks. Setting up a layered defense will significantly decrease the chances of a successful cyber attack on your network. The CyPhy Security Plan is our commitment to protect you whether the attack comes to your front door, or from the internet.

To learn more about our CyPhy Security Plan, please give us a call and we will discuss your current setup as well as the benefits of ramping up your security efforts.

Cyber Security is Complex: Don’t Bury Your Head in the Sand

Cyber SecurityBy Neal Bellamy, IT Director at Kenton Brothers

In the physical security world, we tend to think about security as locks, keys, access control, and maybe cameras. If you are an IT person, you might think security is more about firewalls, usernames, passwords, and encryption. Physical security people and IT security people really have the same goal: Protect the Business. Physical security teams and IT Security teams generally operate in different bubbles, but I think it’s time for another convergence.

Cybercrime has a cost, and when it happens, the cost is often high. In 2021, Ransomware alone cost an estimated 620+ million. While Ransomware is probably one of most everyone’s top concerns, there are other ways to make money from your data. Exporting your data or your customer’s data or denying access to your data could also have major impacts to your business.

The capabilities of computers continue to skyrocket.

Anyone in the computer field knows “Moore’s Law”. While not actually a law of physics, it was more of an observed phenomenon. The idea is that the speed of a computer doubles every two years. This idea is bigger than I’ve given it credit for. You can see the phenomenon in more than just microchips. Since the beginning of programming, we’ve built software tools (by writing code) to make new coding efforts faster. Since the processing power of computers doubles every two years, software has access to more and more resources. Software’s capabilities continue to grow at an astounding rate. Machine learning, Deep learning, and AI are all outcomes of this growth. It’s terrifying and inspiring at the same time.

Here’s why software matters.

Cyber SecurityOnce upon a time, a computer programmer made a program that could do something malicious. It might take that programmer months to code and tweak, then it would be released to the world. Sometimes it would make a big splash. Even if it was a major threat, anti-virus companies would find a way to identify it and stop it in a matter of days. Now, we have programs that make programs. Coding a virus can be done in minutes, but viruses are old hat.

What happens if we release an AI to attack a company? It could find the open ports, discover what software is behind those ports, look up vulnerabilities, and then try to exploit the vulnerabilities in seconds. Once an attacker is in, the game is over. It’s only going to get scarier from here.

What can you do?

First, take it seriously. As someone trying to protect your business, you should have several plans. A defense plan is important, but so are recovery plans. The basics still apply. Protect your perimeter, have at least two sets of backups, and use strong passwords (preferably with Multi-Factor Authentication). Anti-Virus alone is no longer good enough. You need to implement Endpoint detection and response (EDR / XDR / MDR) of some type.

How can Kenton Brothers Help?

While we can’t protect all of your networks (we have partners that do), we will do our part while we are on your network. We make sure that software and firmware are up to date when we install equipment, we use strong, randomly generated passwords for your security systems. This is standard in all of our implementations. If your IT company has further security, we will work side-by-side to complement it. Even though we are a physical security company, we understand and value IT security.

If you need help in the physical security world, we are always here to help. But if you need help in the cyber security world, I am also here to help. I have done a deep dive into the cyber world for the last six months and would be happy to share my knowledge. I’m certainly not an expert, but I can share my experiences trying to make KB more secure. I’ve also met some great people and companies along the way that would love to help you with your cyber security efforts. Just give us a call.