Enlightened Security: The single greatest defense in a security system.

By Baer Halvorson, Security Systems Engineer at Kenton Brothers

Enlightened Security: The single greatest defense in a security system.Randomized Control Experiments are considered to be one of the most effective ways to study cause-and-effect relationships. This method helps minimize biases by randomly assigning participants to either a treatment group (which receives the intervention) or a control group (which does not), ensuring that any differences between the groups can be attributed to the intervention itself, rather than other variables. This method is the gold standard in several major industries like medical intervention, psychology and more.

In 2018, working alongside the Mayor’s Office of Criminal Justice, the New York City Police Department, and the New York City Housing Authority, a research team called The Crime Lab, carried out a six-month randomized controlled trial at nearly 40 public housing developments with high crime levels. Half of these developments were outfitted with new, temporary street lights, while the other half remained unchanged.

Results from the study showed that there was a 39% reduction in index crimes (murder, rape, burglary, motor-vehicle theft, etc.). This percentage deduction in the world of criminological studies is an extreme result in deterring crime. While studies will show video surveillance and alarms reducing at a rate of 30-60% this is often attributed to one or two specific crimes, like robberies or burglary. 39% across all index crimes is a significant reduction and should be something that security consultants lead with.

Hardening Your Property With Lighting

If you are looking to harden your property (commercial or residential), even if you currently have a security system in place, you should consider adding lighting in areas that you might see activity. There are a couple of ways to implement lighting onto a property.

Triggered Lighting

Integrating lighting into something like motion or as a trigger to an alarm is a very effective way to create the appearance of presence. Motion lighting can often be very effective in giving the appearance that someone has turned the light on and caught the threat in the act. This extra bit of psychological strain on an attacker can cause them to instinctually flee the scene.

Lighting can also be activated by a triggered alarm; for example if the front of a property is being breached and a shock sensor goes off because the intruder is trying to kick in the front door, having an alarm trigger the lighting in an office to turn on, or click upstairs lighting on in a house can be a very effective way to deter an attempted intrusion.

Area Lighting

Parking lot lighting and adequate lighting around the property can help assure that threats or attackers can’t lie in wait or find a dark area to access the building from. Lighting around the property also gives surveillance cameras an advantage by bolstering the field of view, pushing visibility that much further. Landscape lighting can be the means to this end without sacrificing aesthetics.

Getting a consultation from a security integrator and taking their lighting recommendations to a landscaping company can be one way to assure that you are hardening a site without making it look like a prison.

Dynamic Lighting

There are also creative ways to use lighting to accomplish specific needs and provide solutions to a site. For instance you can use zoned threat-based activation in perimeter response lighting. This is where instead of just using motion sensors or alarm-triggered lighting, you can layer lighting activations to respond dynamically based on detected movement.

For example, motion on the outer fence line activates perimeter flood lights, moving closer to the building, additional higher-intensity security lights activate in stages, creating an escalating deterrence effect. Strobe and pulsing lights can also be used as a deterrent, whether that’s on the outside of the building to act as a natural surveillance and pull eyes to where the intruder is, or in interior situations to confuse and cause panic in an intruder.

Using different colors to communicate what is happening, using up-lighting at entrances to make it difficult to see in, but easy to see out and integrating lighting into building automation, access control or video surveillance are all ways that lighting can be used to strengthen a security system.

Let’s Talk Lighting!

Light is one of the most underrated and most research-proven, effective ways to deter criminal activity on a property. Access control, intrusion detection and video surveillance can all be improved when integrating these systems with light. When pondering on how to strengthen the security around your business or home, consider first if adding light can deter the criminal. We can help you lock in your lighting security solution. Give us a call!

From Legacy to Leading Edge: A visual journey through the evolution of security technology

From Legacy to Leading EdgeBy Gina Stuelke, CEO of Kenton Brothers

Back in 2008, our industry experienced a significant convergence event joining physical security and IP based networks onto a common platform. This was a major shift away from the disparate systems we had become accustomed to. That seems like such a long time ago! Today, we are involved in another convergence event involving physical security and cyber security.

The two pyramids in the images below represent the technology stacks used by Kenton Brothers, with each layer reflecting the progression of security technologies and how our offerings have elevated over time.

Kenton Brothers 2008 Technology Pyramid

Kenton Brothers Systems for Security: Pyramid1. Base Layer (Mechanical Locking Hardware): Traditional, physical locking systems.
2. High Security Cylinders and Masterkey System Implementation: The introduction of advanced physical keys and locks.
3. Legacy and Stand-Alone Access Control and Analog Video Surveillance Systems: Initial electronic security measures, such as standalone access systems, video surveillance and analog technologies.
4. Network-Based (IP) Access Control and Video Surveillance Systems: The shift to internet-based systems, improving remote access and integration.
5. Integration Services: Combining different systems (video, access control, etc.) for better coordination and ease of use.
6. Hosted and Managed Services: Outsourcing and cloud-based security management to external providers.
7. Video Analytics: Using software to analyze video data and identify suspicious activities automatically.

Kenton Brothers 2024 Technology Pyramid

Kenton Brothers Technology Pyramid1. Base Layer (Security Policies and Procedures): Security begins with robust organizational policies and procedures, a foundational aspect in modern security systems.
2. High Security Physical Hardware: Continues from previous physical security technologies but is more sophisticated.
3. Detection: Active detection systems for unauthorized access or incidents (includes sensors, alarms, etc.).
4. Access Control: Advances in access control technology (includes biometric and smart credentials).
5. Video Surveillance: Video monitoring remains central, but with higher resolution, better storage, and cloud integration.
6. Analytics and AI Support: Modern video surveillance includes AI, improving event detection and proactive analysis.
7. Cyber Hardening: Reflects the growing importance of cybersecurity, securing systems from hacking and digital threats.

What are the comparisons in technological advances?

  • Shift from Analog to IP: Over the last decade, analog systems (present in the first pyramid) have largely been replaced by IP-based systems, which allow for higher quality video and easier integration into larger networks.
  • Integration of AI and Analytics: Modern systems (second pyramid) emphasize the use of AI for proactive security management. This shift moves beyond video analytics to AI-supported threat detection, reducing human workload and improving accuracy.
  • Focus on Cybersecurity: The first pyramid lacks any mention of cybersecurity, which has become essential in modern security infrastructures due to the increasing threat of hacking. Cyber hardening in the second pyramid highlights this critical evolution.
  • Increased Use of Cloud Services: The second pyramid also reflects advances in cloud technologies for video storage, processing, and real-time analytics—leading to more flexible, scalable, and manageable systems.
  • Detection Technologies: Detection is more advanced in the second pyramid, likely including smarter sensors and automated systems integrated with AI.

Security systems have evolved from primarily physical and standalone solutions (first pyramid) to highly integrated, AI-driven, and cyber-secure ecosystems (second pyramid). These technological shifts have led to more automated, efficient, and intelligent systems capable of responding to modern-day security threats.

Has your commercial security stack been in place for a long time? It may be time to take a good look to make sure you are keeping up with the aggressive changes in technology. And if you need help, please give us a call!

Hold On To Your Keys with Key Management Software and Key Tracking Boxes

By Ryan Kaullen, Field Services Manager at Kenton Brothers

A major part of key control and building security is keeping track of your keys. That can happen in many ways including Key Management Software, Electronic Tracking Keys boxes, and risk contingency plans. All of these can work independently from each other, but also work well together. In this article, we will explore each option and how they can help you manage your keys.

Key Management Software

Key Management SoftwareKey Management Software, especially for larger companies, schools, and companies with multiple locations is a powerful way to keep track of all the keys floating around. The Key Management Software solution that we install and configure for our clients has the following capabilities:

  • Track Key issued by User.
  • Date Issued.
  • Date Expected to be returned. (Perhaps you issue a key to a vendor and that vendor will have it for a week, so you set when it should be returned, and if it is not an alert will be triggered.)
  • What Doors the key works with.
  • Department / Floor/ Bldg / etc. the key is tied to.
  • Users can add in building maps to view floor plans of doors.
  • No more tracking keys issued on paper and clipboards.
  • And More!

Understanding from the start who keys are issued to is critical in securing a facility. If that person leaves for any reason, and you don’t know what keys that individual has, and the keys are not returned, it can cause a major security problem and expose you to financial risk. This is why Key Management Software is a good solution.

Electronic Key Tracking Boxes

Key Management SoftwareOver the past decade, companies within the physical security industry have come out with electronic key tracking boxes. The idea is to secure physical keys, manage who issued keys, and make sure keys that are taken are also returned. The electronic key management boxes we install include the following features:

  • Manages who can access the box.
  • Manages what specific keys that user can have access to.
  • Integrates into a lot of access control platforms via licenses.
  • Alerts can be set up if a key is not returned.
  • Allows the ability to only issue keys as an add needed basis versus individuals always carrying keys.
  • Helps control who is allowed in certain areas.
  • And More!

Electronic Key Tracking Boxes can really help cut down on the number of issued keys, who has access and to where, who can get keys, and they also work hand-in-hand with Key Management Software for a facility.

Risk Contingency Plan

So, what happens when a key is lost? Stolen? This is going to happen at some point, and having a plan is crucial to mitigating risk, liability, and minimizing financial implications. Setting up a master key plan to help minimize risks is very important. Having a trusted locksmith partner who can come in and rekey the locks affected and using Key Management Software is a winning combination.

To learn more about these key management solutions and how we can help you take control of how you are issuing and tracking keys, please give us a call!

Enhancing Physical Security with Kenton Brothers Systems for Security CSEIP Certified Engineers

By David Strickland, Vice President of Kenton Brothers

CSEIP Certified EngineersFederal Agencies are continuously seeking robust solutions to safeguard their assets and personnel. Physical security plays a pivotal role in this endeavor, encompassing a range of measures to Protect People Property and Possessions from unauthorized access or harm. Among these measures, Identity, Credential, and Access Management (ICAM) systems integrated with Physical Access Control Systems (PACS) have emerged as a cornerstone for ensuring comprehensive security solutions. In this blog, we delve into the significance of having Certified Security Engineer Identity Professional (CSEIP) certified engineers managing ICAM PACS and explore real-world use cases across government agencies.

Understanding ICAM PACS:

ICAM PACS integrates physical access control with identity management, enabling organizations to efficiently manage and control access to their facilities. These systems authenticate and authorize individuals based on their credentials, ensuring that only authorized personnel can enter designated areas. ICAM PACS solutions often encompass a variety of technologies such as smart cards, biometrics, and multi-factor authentication, providing layers of security to mitigate risks effectively.

Benefits of CSEIP Certified Engineers:

CSEIP Certified EngineersCSEIP certification is a testament to an engineer’s expertise in designing, installing, and maintaining advanced security systems, including ICAM PACS. Expertise in ICAM PACS Integration: CSEIP certified engineers possess in-depth knowledge of ICAM PACS technologies and standards, ensuring seamless integration with existing security infrastructure. Their expertise enables organizations to optimize system performance while maintaining compliance with regulatory requirements.

By leveraging the expertise of CSEIP certified engineers, organizations can implement robust security measures tailored to their specific needs. From designing access control policies to configuring authentication mechanisms, these professionals ensure that security vulnerabilities are effectively addressed, bolstering overall protection.

With CSEIP certified engineers leading the way, organizations can mitigate the risk of security breaches and unauthorized access attempts. These experts implement industry best practices and deploy advanced security features to fortify ICAM PACS against evolving threats, safeguarding critical assets and sensitive information.

CSEIP certified engineers possess the skills to diagnose and resolve issues promptly, minimizing downtime and ensuring uninterrupted security operations. Their proactive approach to maintenance helps organizations identify potential vulnerabilities early on, preempting security risks before they escalate.

Use Case Scenarios:

Let’s explore how government agencies can benefit from having CSEIP certified engineers managing ICAM PACS:

Department of Defense (DoD):

CSEIP Certified EngineersThe Department of Defense operates a vast network of facilities and installations worldwide, each requiring stringent access control measures to safeguard classified information and sensitive equipment. By employing CSEIP certified engineers to manage ICAM PACS, the DoD ensures that only authorized personnel gain access to restricted areas. These professionals design and implement multifactor authentication systems, incorporating biometric verification and smart card technology to enhance security while streamlining access for authorized personnel.

Federal Bureau of Investigation (FBI):

As the principal federal law enforcement agency, the FBI relies on robust security protocols to protect its headquarters, field offices, and forensic laboratories. CSEIP certified engineers play a crucial role in designing and maintaining ICAM PACS solutions tailored to the FBI’s specific security requirements. By deploying advanced authentication mechanisms and intrusion detection systems, these professionals help safeguard sensitive investigative materials and ensure the integrity of the agency’s operations.

Department of Homeland Security (DHS):

The Department of Homeland Security oversees critical infrastructure and coordinates efforts to protect the nation from security threats. CSEIP certified engineers support DHS initiatives by implementing comprehensive ICAM PACS solutions across various agencies and facilities. These experts collaborate with stakeholders to design access control policies aligned with DHS mandates, enhancing situational awareness and emergency response capabilities.

By entrusting ICAM PACS management to CSEIP certified engineers, organizations can reap the benefits of enhanced security, reduced risk, and streamlined operations. As demonstrated through real-world use cases in government agencies, the expertise of CSEIP certified engineers is indispensable in safeguarding critical assets and ensuring the integrity of physical security systems.

Kenton Brothers Systems for Security is proud to offer our services to our Federal Agency partners.
Please give us a call today to see how we can help support your organization!

Physical Security Defense by Design: 10 things you should be doing today!

By David Strickland, Vice President of Kenton Brothers

With a tremendous focus on Cybersecurity right now, many organizations are investing substantial resources in protecting their digital assets from online threats. However, amidst the ever-evolving landscape of security risks, the significance of physical security and it’s role in a holistic approach to protecting people property and possessions should not be underestimated.

A robust physical security plan, employing the principle of defense by design, can fortify businesses against a myriad of threats, ranging from cybersecurity threats, theft and vandalism to unauthorized access and violence in the workplace. In this blog, we’ll explore how businesses can see substantial benefits by implementing a proper physical security plan centered around defense by design.

Understanding Defense by Design

Defense by DesignDefense by design is a proactive approach to security that involves integrating security measures into the design and architecture of a physical space from the very beginning. Rather than treating security as an afterthought, it becomes an integral part of the overall design process. This approach aims to create layers of security that deter, delay, and ultimately thwart potential threats, providing businesses with a comprehensive defense strategy.

One of the primary benefits of adopting defense by design principles in physical security planning is the enhanced protection it offers against various threats. By strategically incorporating barriers, access controls, surveillance systems, and other security features into the layout of a facility, businesses can significantly reduce the likelihood of unauthorized access, theft, or vandalism.

For instance, installing perimeter fencing, access gates with electronic locks, and surveillance cameras can create a formidable first line of defense against intruders. Additionally, implementing measures such as biometric access controls, motion sensors, and alarm systems further reinforce security layers, making it increasingly difficult for unauthorized individuals to breach the premises undetected.

Mitigation of Risks and Liabilities

Effective physical security not only safeguards assets but also helps mitigate risks and liabilities associated with security breaches. Businesses operating in industries handling sensitive information, valuable assets, or high-risk materials are particularly vulnerable to potential threats. A robust physical security plan reduces the likelihood of security incidents, thereby minimizing the risk of theft, property damage, or regulatory non-compliance.

Moreover, in the event of a security breach, having comprehensive security measures in place can demonstrate due diligence on the part of the business, potentially mitigating legal liabilities and financial losses. By investing in defense by design, businesses not only protect their assets but also safeguard their reputation and maintain trust with stakeholders.

Safeguarding Personnel and Assets

In addition to protecting physical assets, a well-executed physical security plan prioritizes the safety and well-being of personnel. Employees are vital assets to any business, and ensuring their safety within the workplace is paramount. By implementing measures such as access control systems, emergency response protocols, and secure areas for sensitive operations, businesses create a secure environment that fosters employee confidence and productivity.

Furthermore, defense by design principles extend beyond the protection of physical assets to safeguarding intellectual property and confidential information. Secure storage facilities, restricted access areas, and surveillance systems help prevent unauthorized access to sensitive data, reducing the risk of intellectual property theft or corporate espionage.

Cost-Efficiency and Long-Term Sustainability

While implementing a comprehensive physical security plan requires an initial investment, the long-term benefits far outweigh the costs. By proactively addressing security vulnerabilities through defense by design, businesses can minimize the need for reactive security measures and costly incident response procedures.

Moreover, the deterrent effect of visible security measures can dissuade potential threats, reducing the likelihood of security incidents and associated expenses. Over time, the cost savings achieved through enhanced security and risk mitigation contribute to the long-term sustainability and profitability of the business.

At Kenton Brothers Systems for Security we work with organizations with a wide range of needs for physical Security. We have specific recommendations on how to implement a proper physical Security Plan that incorporates a holistic approach to our customer’s needs.

The following is a top 10 list of ways to get started:

1. Conduct Comprehensive Risk Assessment

Begin by conducting a thorough risk assessment of your premises and operations. Identify potential security threats and vulnerabilities, considering factors such as location, industry, and business assets. This assessment forms the foundation for developing an effective physical security plan tailored to your specific needs. We offer this service free of charge to help support the communities we serve.

2. Define Clear Security Objectives

Establish clear security objectives aligned with your business goals and risk assessment findings. Determine what assets and areas require protection, whether it’s sensitive data, equipment, or personnel. Clearly defined objectives provide a roadmap for designing and implementing targeted security measures.  This can be overwhelming at first, Kenton Brothers can help guide you through this process.

3. Design Secure Perimeter Barriers

Create a secure perimeter around your facility using physical barriers such as fencing, walls, locked perimeter doors or bollards. Choose materials and designs that deter unauthorized access and provide visibility for surveillance. Incorporate access control points with electronic locks and gates to regulate entry and exit.  The idea here is to extend your threat detection perimeter as much as possible to allow more time to bring resources to bear on the threat.

4. Implement Access Control Systems

Deploy access control systems to manage and monitor entry points throughout your facility. Utilize technologies such as key cards, biometric scanners, or PIN codes to authenticate individuals and restrict access to authorized personnel only. Integrate access control systems with surveillance cameras and alarms for enhanced security.

5. Install Surveillance Cameras and Monitoring Systems

Strategically place surveillance cameras and monitoring systems to provide comprehensive coverage of your premises. Install cameras in key areas such as entry points, parking lots, and critical infrastructure to deter theft, vandalism, and unauthorized activities. Ensure proper lighting and resolution for clear video footage.

6. Establish Secure Entry and Exit Procedures

Develop secure entry and exit procedures to control the flow of personnel and visitors. Implement protocols for visitor management, including check-in processes and temporary access badges. Train employees on security procedures and reinforce the importance of vigilance in identifying and reporting suspicious behavior.

7. Harden Physical Infrastructure

Strengthen physical infrastructure by reinforcing doors, windows, and other potential entry points. Use tamper-resistant locks, security bars, and shatter-resistant glass to deter break-ins and unauthorized access. Consider implementing intrusion detection systems to alert security personnel of attempted breaches.

8. Create Secure Areas for Sensitive Operations

Designate secure areas within your facility for sensitive operations, data storage, or high-value assets. Restrict access to these areas using additional layers of security such as biometric authentication or keypad entry. Implement measures to prevent unauthorized tampering or theft of sensitive materials.  Concentric circles of tighter and tighter security help organizations keep their people and assets secure.

9. Develop Emergency Response Plans

Develop comprehensive emergency response plans to address various security scenarios, including intrusions, natural disasters, or workplace violence. Conduct regular drills and training exercises to ensure employees are prepared to respond effectively to emergencies. Establish communication protocols and evacuation procedures to minimize risks to personnel and assets.  There is no better resource than a well-trained team member that knows what to look for and how to react in a threating situation.

10. Regularly Evaluate and Update Security Measures

Stay informed about emerging security technologies and best practices to enhance your defense by design approach.  Continuously evaluate and update your physical security measures to adapt to evolving threats and vulnerabilities. Conduct regular audits and assessments to identify weaknesses and areas for improvement. This is a critical piece of defense by design. Stay vigilant in your efforts. There are many stories of the convenience of a propped door and how it led to tragedy.

By following these ten specific steps, businesses can effectively incorporate physical security measures based on defense by design principles, creating safer environments for their People, property and possessions.

Still can’t get started? Give Kenton Brothers Systems for Security a call today to help.