From Legacy to Leading Edge: A visual journey through the evolution of security technology

From Legacy to Leading EdgeBy Gina Stuelke, CEO of Kenton Brothers

Back in 2008, our industry experienced a significant convergence event joining physical security and IP based networks onto a common platform. This was a major shift away from the disparate systems we had become accustomed to. That seems like such a long time ago! Today, we are involved in another convergence event involving physical security and cyber security.

The two pyramids in the images below represent the technology stacks used by Kenton Brothers, with each layer reflecting the progression of security technologies and how our offerings have elevated over time.

Kenton Brothers 2008 Technology Pyramid

Kenton Brothers Systems for Security: Pyramid1. Base Layer (Mechanical Locking Hardware): Traditional, physical locking systems.
2. High Security Cylinders and Masterkey System Implementation: The introduction of advanced physical keys and locks.
3. Legacy and Stand-Alone Access Control and Analog Video Surveillance Systems: Initial electronic security measures, such as standalone access systems, video surveillance and analog technologies.
4. Network-Based (IP) Access Control and Video Surveillance Systems: The shift to internet-based systems, improving remote access and integration.
5. Integration Services: Combining different systems (video, access control, etc.) for better coordination and ease of use.
6. Hosted and Managed Services: Outsourcing and cloud-based security management to external providers.
7. Video Analytics: Using software to analyze video data and identify suspicious activities automatically.

Kenton Brothers 2024 Technology Pyramid

Kenton Brothers Technology Pyramid1. Base Layer (Security Policies and Procedures): Security begins with robust organizational policies and procedures, a foundational aspect in modern security systems.
2. High Security Physical Hardware: Continues from previous physical security technologies but is more sophisticated.
3. Detection: Active detection systems for unauthorized access or incidents (includes sensors, alarms, etc.).
4. Access Control: Advances in access control technology (includes biometric and smart credentials).
5. Video Surveillance: Video monitoring remains central, but with higher resolution, better storage, and cloud integration.
6. Analytics and AI Support: Modern video surveillance includes AI, improving event detection and proactive analysis.
7. Cyber Hardening: Reflects the growing importance of cybersecurity, securing systems from hacking and digital threats.

What are the comparisons in technological advances?

  • Shift from Analog to IP: Over the last decade, analog systems (present in the first pyramid) have largely been replaced by IP-based systems, which allow for higher quality video and easier integration into larger networks.
  • Integration of AI and Analytics: Modern systems (second pyramid) emphasize the use of AI for proactive security management. This shift moves beyond video analytics to AI-supported threat detection, reducing human workload and improving accuracy.
  • Focus on Cybersecurity: The first pyramid lacks any mention of cybersecurity, which has become essential in modern security infrastructures due to the increasing threat of hacking. Cyber hardening in the second pyramid highlights this critical evolution.
  • Increased Use of Cloud Services: The second pyramid also reflects advances in cloud technologies for video storage, processing, and real-time analytics—leading to more flexible, scalable, and manageable systems.
  • Detection Technologies: Detection is more advanced in the second pyramid, likely including smarter sensors and automated systems integrated with AI.

Security systems have evolved from primarily physical and standalone solutions (first pyramid) to highly integrated, AI-driven, and cyber-secure ecosystems (second pyramid). These technological shifts have led to more automated, efficient, and intelligent systems capable of responding to modern-day security threats.

Has your commercial security stack been in place for a long time? It may be time to take a good look to make sure you are keeping up with the aggressive changes in technology. And if you need help, please give us a call!

Hold On To Your Keys with Key Management Software and Key Tracking Boxes

By Ryan Kaullen, Field Services Manager at Kenton Brothers

A major part of key control and building security is keeping track of your keys. That can happen in many ways including Key Management Software, Electronic Tracking Keys boxes, and risk contingency plans. All of these can work independently from each other, but also work well together. In this article, we will explore each option and how they can help you manage your keys.

Key Management Software

Key Management SoftwareKey Management Software, especially for larger companies, schools, and companies with multiple locations is a powerful way to keep track of all the keys floating around. The Key Management Software solution that we install and configure for our clients has the following capabilities:

  • Track Key issued by User.
  • Date Issued.
  • Date Expected to be returned. (Perhaps you issue a key to a vendor and that vendor will have it for a week, so you set when it should be returned, and if it is not an alert will be triggered.)
  • What Doors the key works with.
  • Department / Floor/ Bldg / etc. the key is tied to.
  • Users can add in building maps to view floor plans of doors.
  • No more tracking keys issued on paper and clipboards.
  • And More!

Understanding from the start who keys are issued to is critical in securing a facility. If that person leaves for any reason, and you don’t know what keys that individual has, and the keys are not returned, it can cause a major security problem and expose you to financial risk. This is why Key Management Software is a good solution.

Electronic Key Tracking Boxes

Key Management SoftwareOver the past decade, companies within the physical security industry have come out with electronic key tracking boxes. The idea is to secure physical keys, manage who issued keys, and make sure keys that are taken are also returned. The electronic key management boxes we install include the following features:

  • Manages who can access the box.
  • Manages what specific keys that user can have access to.
  • Integrates into a lot of access control platforms via licenses.
  • Alerts can be set up if a key is not returned.
  • Allows the ability to only issue keys as an add needed basis versus individuals always carrying keys.
  • Helps control who is allowed in certain areas.
  • And More!

Electronic Key Tracking Boxes can really help cut down on the number of issued keys, who has access and to where, who can get keys, and they also work hand-in-hand with Key Management Software for a facility.

Risk Contingency Plan

So, what happens when a key is lost? Stolen? This is going to happen at some point, and having a plan is crucial to mitigating risk, liability, and minimizing financial implications. Setting up a master key plan to help minimize risks is very important. Having a trusted locksmith partner who can come in and rekey the locks affected and using Key Management Software is a winning combination.

To learn more about these key management solutions and how we can help you take control of how you are issuing and tracking keys, please give us a call!

Enhancing Physical Security with Kenton Brothers Systems for Security CSEIP Certified Engineers

By David Strickland, Vice President of Kenton Brothers

CSEIP Certified EngineersFederal Agencies are continuously seeking robust solutions to safeguard their assets and personnel. Physical security plays a pivotal role in this endeavor, encompassing a range of measures to Protect People Property and Possessions from unauthorized access or harm. Among these measures, Identity, Credential, and Access Management (ICAM) systems integrated with Physical Access Control Systems (PACS) have emerged as a cornerstone for ensuring comprehensive security solutions. In this blog, we delve into the significance of having Certified Security Engineer Identity Professional (CSEIP) certified engineers managing ICAM PACS and explore real-world use cases across government agencies.

Understanding ICAM PACS:

ICAM PACS integrates physical access control with identity management, enabling organizations to efficiently manage and control access to their facilities. These systems authenticate and authorize individuals based on their credentials, ensuring that only authorized personnel can enter designated areas. ICAM PACS solutions often encompass a variety of technologies such as smart cards, biometrics, and multi-factor authentication, providing layers of security to mitigate risks effectively.

Benefits of CSEIP Certified Engineers:

CSEIP Certified EngineersCSEIP certification is a testament to an engineer’s expertise in designing, installing, and maintaining advanced security systems, including ICAM PACS. Expertise in ICAM PACS Integration: CSEIP certified engineers possess in-depth knowledge of ICAM PACS technologies and standards, ensuring seamless integration with existing security infrastructure. Their expertise enables organizations to optimize system performance while maintaining compliance with regulatory requirements.

By leveraging the expertise of CSEIP certified engineers, organizations can implement robust security measures tailored to their specific needs. From designing access control policies to configuring authentication mechanisms, these professionals ensure that security vulnerabilities are effectively addressed, bolstering overall protection.

With CSEIP certified engineers leading the way, organizations can mitigate the risk of security breaches and unauthorized access attempts. These experts implement industry best practices and deploy advanced security features to fortify ICAM PACS against evolving threats, safeguarding critical assets and sensitive information.

CSEIP certified engineers possess the skills to diagnose and resolve issues promptly, minimizing downtime and ensuring uninterrupted security operations. Their proactive approach to maintenance helps organizations identify potential vulnerabilities early on, preempting security risks before they escalate.

Use Case Scenarios:

Let’s explore how government agencies can benefit from having CSEIP certified engineers managing ICAM PACS:

Department of Defense (DoD):

CSEIP Certified EngineersThe Department of Defense operates a vast network of facilities and installations worldwide, each requiring stringent access control measures to safeguard classified information and sensitive equipment. By employing CSEIP certified engineers to manage ICAM PACS, the DoD ensures that only authorized personnel gain access to restricted areas. These professionals design and implement multifactor authentication systems, incorporating biometric verification and smart card technology to enhance security while streamlining access for authorized personnel.

Federal Bureau of Investigation (FBI):

As the principal federal law enforcement agency, the FBI relies on robust security protocols to protect its headquarters, field offices, and forensic laboratories. CSEIP certified engineers play a crucial role in designing and maintaining ICAM PACS solutions tailored to the FBI’s specific security requirements. By deploying advanced authentication mechanisms and intrusion detection systems, these professionals help safeguard sensitive investigative materials and ensure the integrity of the agency’s operations.

Department of Homeland Security (DHS):

The Department of Homeland Security oversees critical infrastructure and coordinates efforts to protect the nation from security threats. CSEIP certified engineers support DHS initiatives by implementing comprehensive ICAM PACS solutions across various agencies and facilities. These experts collaborate with stakeholders to design access control policies aligned with DHS mandates, enhancing situational awareness and emergency response capabilities.

By entrusting ICAM PACS management to CSEIP certified engineers, organizations can reap the benefits of enhanced security, reduced risk, and streamlined operations. As demonstrated through real-world use cases in government agencies, the expertise of CSEIP certified engineers is indispensable in safeguarding critical assets and ensuring the integrity of physical security systems.

Kenton Brothers Systems for Security is proud to offer our services to our Federal Agency partners.
Please give us a call today to see how we can help support your organization!

Physical Security Defense by Design: 10 things you should be doing today!

By David Strickland, Vice President of Kenton Brothers

With a tremendous focus on Cybersecurity right now, many organizations are investing substantial resources in protecting their digital assets from online threats. However, amidst the ever-evolving landscape of security risks, the significance of physical security and it’s role in a holistic approach to protecting people property and possessions should not be underestimated.

A robust physical security plan, employing the principle of defense by design, can fortify businesses against a myriad of threats, ranging from cybersecurity threats, theft and vandalism to unauthorized access and violence in the workplace. In this blog, we’ll explore how businesses can see substantial benefits by implementing a proper physical security plan centered around defense by design.

Understanding Defense by Design

Defense by DesignDefense by design is a proactive approach to security that involves integrating security measures into the design and architecture of a physical space from the very beginning. Rather than treating security as an afterthought, it becomes an integral part of the overall design process. This approach aims to create layers of security that deter, delay, and ultimately thwart potential threats, providing businesses with a comprehensive defense strategy.

One of the primary benefits of adopting defense by design principles in physical security planning is the enhanced protection it offers against various threats. By strategically incorporating barriers, access controls, surveillance systems, and other security features into the layout of a facility, businesses can significantly reduce the likelihood of unauthorized access, theft, or vandalism.

For instance, installing perimeter fencing, access gates with electronic locks, and surveillance cameras can create a formidable first line of defense against intruders. Additionally, implementing measures such as biometric access controls, motion sensors, and alarm systems further reinforce security layers, making it increasingly difficult for unauthorized individuals to breach the premises undetected.

Mitigation of Risks and Liabilities

Effective physical security not only safeguards assets but also helps mitigate risks and liabilities associated with security breaches. Businesses operating in industries handling sensitive information, valuable assets, or high-risk materials are particularly vulnerable to potential threats. A robust physical security plan reduces the likelihood of security incidents, thereby minimizing the risk of theft, property damage, or regulatory non-compliance.

Moreover, in the event of a security breach, having comprehensive security measures in place can demonstrate due diligence on the part of the business, potentially mitigating legal liabilities and financial losses. By investing in defense by design, businesses not only protect their assets but also safeguard their reputation and maintain trust with stakeholders.

Safeguarding Personnel and Assets

In addition to protecting physical assets, a well-executed physical security plan prioritizes the safety and well-being of personnel. Employees are vital assets to any business, and ensuring their safety within the workplace is paramount. By implementing measures such as access control systems, emergency response protocols, and secure areas for sensitive operations, businesses create a secure environment that fosters employee confidence and productivity.

Furthermore, defense by design principles extend beyond the protection of physical assets to safeguarding intellectual property and confidential information. Secure storage facilities, restricted access areas, and surveillance systems help prevent unauthorized access to sensitive data, reducing the risk of intellectual property theft or corporate espionage.

Cost-Efficiency and Long-Term Sustainability

While implementing a comprehensive physical security plan requires an initial investment, the long-term benefits far outweigh the costs. By proactively addressing security vulnerabilities through defense by design, businesses can minimize the need for reactive security measures and costly incident response procedures.

Moreover, the deterrent effect of visible security measures can dissuade potential threats, reducing the likelihood of security incidents and associated expenses. Over time, the cost savings achieved through enhanced security and risk mitigation contribute to the long-term sustainability and profitability of the business.

At Kenton Brothers Systems for Security we work with organizations with a wide range of needs for physical Security. We have specific recommendations on how to implement a proper physical Security Plan that incorporates a holistic approach to our customer’s needs.

The following is a top 10 list of ways to get started:

1. Conduct Comprehensive Risk Assessment

Begin by conducting a thorough risk assessment of your premises and operations. Identify potential security threats and vulnerabilities, considering factors such as location, industry, and business assets. This assessment forms the foundation for developing an effective physical security plan tailored to your specific needs. We offer this service free of charge to help support the communities we serve.

2. Define Clear Security Objectives

Establish clear security objectives aligned with your business goals and risk assessment findings. Determine what assets and areas require protection, whether it’s sensitive data, equipment, or personnel. Clearly defined objectives provide a roadmap for designing and implementing targeted security measures.  This can be overwhelming at first, Kenton Brothers can help guide you through this process.

3. Design Secure Perimeter Barriers

Create a secure perimeter around your facility using physical barriers such as fencing, walls, locked perimeter doors or bollards. Choose materials and designs that deter unauthorized access and provide visibility for surveillance. Incorporate access control points with electronic locks and gates to regulate entry and exit.  The idea here is to extend your threat detection perimeter as much as possible to allow more time to bring resources to bear on the threat.

4. Implement Access Control Systems

Deploy access control systems to manage and monitor entry points throughout your facility. Utilize technologies such as key cards, biometric scanners, or PIN codes to authenticate individuals and restrict access to authorized personnel only. Integrate access control systems with surveillance cameras and alarms for enhanced security.

5. Install Surveillance Cameras and Monitoring Systems

Strategically place surveillance cameras and monitoring systems to provide comprehensive coverage of your premises. Install cameras in key areas such as entry points, parking lots, and critical infrastructure to deter theft, vandalism, and unauthorized activities. Ensure proper lighting and resolution for clear video footage.

6. Establish Secure Entry and Exit Procedures

Develop secure entry and exit procedures to control the flow of personnel and visitors. Implement protocols for visitor management, including check-in processes and temporary access badges. Train employees on security procedures and reinforce the importance of vigilance in identifying and reporting suspicious behavior.

7. Harden Physical Infrastructure

Strengthen physical infrastructure by reinforcing doors, windows, and other potential entry points. Use tamper-resistant locks, security bars, and shatter-resistant glass to deter break-ins and unauthorized access. Consider implementing intrusion detection systems to alert security personnel of attempted breaches.

8. Create Secure Areas for Sensitive Operations

Designate secure areas within your facility for sensitive operations, data storage, or high-value assets. Restrict access to these areas using additional layers of security such as biometric authentication or keypad entry. Implement measures to prevent unauthorized tampering or theft of sensitive materials.  Concentric circles of tighter and tighter security help organizations keep their people and assets secure.

9. Develop Emergency Response Plans

Develop comprehensive emergency response plans to address various security scenarios, including intrusions, natural disasters, or workplace violence. Conduct regular drills and training exercises to ensure employees are prepared to respond effectively to emergencies. Establish communication protocols and evacuation procedures to minimize risks to personnel and assets.  There is no better resource than a well-trained team member that knows what to look for and how to react in a threating situation.

10. Regularly Evaluate and Update Security Measures

Stay informed about emerging security technologies and best practices to enhance your defense by design approach.  Continuously evaluate and update your physical security measures to adapt to evolving threats and vulnerabilities. Conduct regular audits and assessments to identify weaknesses and areas for improvement. This is a critical piece of defense by design. Stay vigilant in your efforts. There are many stories of the convenience of a propped door and how it led to tragedy.

By following these ten specific steps, businesses can effectively incorporate physical security measures based on defense by design principles, creating safer environments for their People, property and possessions.

Still can’t get started? Give Kenton Brothers Systems for Security a call today to help.

Installing a camera without wires or power? Solar to the rescue.

By Neal Bellamy, IT Director at Kenton Brothers

Installing a camera without wires or power? Solar to the rescue.In a lot of ways, the requirements to install a commercial security camera are usually pretty easy to accomodate. 90% of the time we need just one wire that is smaller than your pinky finger. We can install that wire inside, outside, in conduit, or even stretch it between poles. We used to have limits on how far away a camera could be installed, but with new wire technologies and PoE extenders (Power over Ethernet), distance is rarely an issue. However, there are still times when you just can’t get a wire to where you want to install a camera.

The next best option is to at least have a power source. With a constant power source, we can at least power the camera and hopefully connect it to a wireless or fiber network to get the signal back to a base station. Kenton Brothers has installed numerous cameras where the only resource we had was power. Entire city blocks are blanketed with a wireless network for this type of security situation.

But what is the solution when you have to have a camera, but don’t have power and can’t get a wire there?

Solar Power

Installing a camera without wires or power? Solar to the rescue.Solar power is not a new thing. It’s been around for decades. The hard part about solar is not the technology or the calculations, the hard part about solar is deploying it. Solar panels work by charging a bank of batteries when the sun is out and then using the batteries to power equipment when it’s dark.

First, of course, is knowing the load that will be running on the circuit. Second, is knowing which solar zone you’re in. (This is a measurement of how much sun you can expect in the area you will be deploying solar.) Last is knowing how long you need to be able to tolerate not having any sunlight. Based on all of that information, you or your solar system provider can determine how big the solar panels will need to be and how many will be needed to support periods of time without sunlight.

Solar Kits

A solar kit comes with solar panels, a solar controller, and batteries. What isn’t commonly thought of is the size of the panels and the weight of the batteries. For a recent project at a lake, our single 300-watt panel was about 3′ by 5′. This large surface area acts like a sail in the wind . If installed on a pole (the most likely type of installation) you have to account for the wind when specifying the size and strength of the pole. Likewise, the batteries that were needed for this installation weighed almost 120 pounds!

Using solar panels on poles provides a way to install cameras where there is no wire and no power. The solar panels can support the power requirements of the camera(s) as well as communication equipment like point to point or wireless. (It would also be possible to record locally to the camera or a weather hardened server, but a bit more challenging to get to that data.)

As you can see in these project pictures, the end result is a sturdy, self contained, solar powered security camera with a wireless data connection. And it’s high enough off the ground to avoid tampering.

If you have a unique situation where you aren’t sure how to get power and connectivity to a camera, give us a call. We will have the products and techniques to solve your problem!

Installing a camera without wires or power? Solar to the rescue. Installing a camera without wires or power? Solar to the rescue.