Behind the Scenes at Kenton Brothers: The Power of Our Remote Teams

By Anna Strickland, Intern at Kenton Brothers

The Power of Our Remote TeamsAt Kenton Brothers, keeping the customer safe does not always require a technician to be on site. Our Remote Install Group (RIG) and Remote Services Group (RSG) are dedicated to delivering fast and reliable security solutions without leaving their desks. Team members work behind the scenes to ensure that systems are installed and maintained properly to keep customers safe.

RIG: Setting Systems Up for Success

The Remote Install Group is responsible for making new security systems and upgrading ones already in use. Their main goal is to tailor these systems to the customer’s exact needs.

What RIG Does:

  • System Programming and Configuration: They can remotely program various types of security components.
  • Testing and Verification: Before a system goes live, they confirm functionality so the system will operate as designed.
  • Faster Turnovers: Programming remotely makes installation more efficient and convenient for the customer.

RSG: Reliable Ongoing Maintenance

Once a system is installed, the Remote Service Group is available for support when necessary. If it is determined that a technician does not have to go on-site to fix an issue, this group steps in to quickly resolve it.

What RSG Does:

  • Troubleshooting and Diagnostics: Identifying and solving system issues such as device and sensor errors.
  • System Adjustments: Upgrading licenses and training as well as regular check-ups.
  • Customer Support: Directly working with customers to answer any questions and guide them through their systems.

Working Together for the Best Outcome

Both kinds of service are necessary for the best security. Every step of the way, they are supporting technicians and customers throughout the security process. Kenton Brothers’ remote service groups deliver smarter and more reliable security from the time of set-up and through long-term maintenance. Their expertise allows us to respond quickly and meet our service standards.

To learn more about how RIG and RSG could benefit your company, give us a call!

Locked Down: How Kenton Brothers Protects the World’s Most Sensitive Bio Labs

Locked Down: How Kenton Brothers Protects the World’s Most Sensitive Bio LabsBy David Strickland, COO of Kenton Brothers

When your facility houses some of the most dangerous pathogens on Earth, “good security” isn’t enough. It has to be flawless. At Kenton Brothers Systems for Security, we design and integrate multi-layered defense systems for biosafety level 3 (BSL-3) and level 4 (BSL-4) laboratories—environments so secure they’ve been called “prisons for pathogens.”

These are not metaphors. In these labs, every door, every badge reader, every airlock, and every human step is part of a tightly choreographed plan to protect people, property, and the public.

Multi-Layered Defense: The Fortress Within

High-containment labs demand more than barriers—they demand logic. Our security architecture mirrors the same redundant, fail-safe philosophy found in federal and state biosafety regulations (CDC/NIH BMBL, Select Agent Program, and NIH DRM standards).

We engineer defense in depth, including:

  • Perimeter control: Hardened access points, high-security locks, and biometric or multi-factor authentication.
  • Zoned containment: Security levels increase as personnel move closer to pathogen areas, with interlocked doors and pressure-controlled airlocks.
  • Integrated logic: Our systems communicate with building automation to prevent unsafe entry during air or power anomalies.
  • Redundancy everywhere: Backup power, dual networks, and redundant sensors ensure that nothing fails when it matters most.

This approach creates a living fortress—always secure, never stagnant.

Trained and Trusted Personnel

Technology is only as reliable as the people behind it. Every Kenton Brothers technician and project manager who enters a high-containment environment is vetted, trained, and briefed on biosafety principles.  We align our practices with Select Agent Regulations (42 CFR Part 73) and OSHA’s Bloodborne Pathogens Standard, ensuring our teams understand both the engineering and human safety sides of containment work.

Our specialists are drilled in:

  • Door interlock logic and pressure sequence validation
  • Emergency power and lockdown procedures
  • Secure credentialing and audit requirements
  • Integrated testing with mechanical and life-safety systems

In these labs, there is no margin for human error—and we treat it that way.

Locked Down: How Kenton Brothers Protects the World’s Most Sensitive Bio Labs

One Command Center, One Pane of Glass

Managing hundreds of sensors, controllers, and HVAC interfaces across a containment facility can overwhelm traditional systems. That’s why we design and install unified command environments with single plane of glass dashboards that visualize:

  • Door states and interlocks
  • Pressure differentials and HVAC status
  • Camera feeds and alarm conditions
  • Access events and audit trails

This “one-pane-of-glass” view allows facility teams to see, control, and verify their entire environment instantly. When seconds matter, clarity saves lives.

Seamless Upgrades, Zero Downtime

High-containment labs can’t afford outages. Our proprietary transition process allows us to modernize and take over legacy systems while they remain operational. Using shadow controllers, parallel databases, and staged commissioning, we keep containment intact while bringing systems up to today’s standards.

The result? Continuous security, continuous science.

Built to Meet and Exceed Federal Standards

Every design we deliver aligns with or exceeds:

  • CDC/NIH Biosafety in Microbiological and Biomedical Laboratories (BMBL, 6th Edition)
  • NIH Design Requirements Manual (DRM)
  • Federal Select Agent Program (FSAP)
  • ASHRAE laboratory ventilation guidance
  • UL 294 for access control equipment performance

These aren’t boxes we check—they’re the foundation of our design philosophy.

Protecting People, Science, and the Public

At Kenton Brothers, we believe that security and science share the same mission: protect life.
Our systems safeguard the researchers who push the boundaries of medicine and the communities who depend on their breakthroughs.

In a environment where the stakes couldn’t be higher, we bring together trained people, proven processes, and hardened technology to ensure that what’s inside those walls stays inside and that those who work there come home safely every day.

Because when it comes to pathogen containment, there’s no second chance.

What Kansas City Commercial Customers Are Really Looking for in Physical Security in 2025

By David Strickland, COO of Kenton Brothers

What Kansas City Commercial Customers Are Really Looking for in Physical Security in 2025If you’ve been Googling “security system upgrade” lately or walked through the aisles of a big security trade show, you’ve probably noticed the same buzzwords popping up everywhere: hybrid cloud, AI analytics, mobile credentials, unified platforms.

It can feel like a lot. And if you’re wondering, “Am I the only one who feels stuck between old systems and all this new tech?”, you’re not. The truth is, most organizations are in that exact same boat. The good news? The industry is finally catching up to what real businesses actually need: solutions that are easy to use, flexible, and comprehensive.

And that’s where we come in. At Kenton Brothers Systems for Security, our job is to help you cut through the noise and build a system that works for you—not the other way around.

What Customers Are Asking For in 2025

  1. Security Systems That Flex With You

What Kansas City Commercial Customers Are Really Looking for in Physical Security in 2025Nobody wants to rip out everything they already own just to modernize. That’s why “hybrid cloud” is such a hot topic. It simply means you can keep some things local (on-prem or at the edge) while moving other parts to the cloud. It’s about choice, flexibility, and evolving at your own pace.

  1. Smarter, Not Just Bigger

Cameras and alarms are great—but what do you do when you’re drowning in alerts? That’s where AI and analytics come in. Smarter systems can flag what matters (like unusual behavior or trespassing) and filter out the rest, so your team spends less time chasing false alarms.

  1. One System, Not Five

It’s frustrating to juggle different logins for cameras, door access, alarms, and visitor systems. More and more, customers are looking for one unified platform where everything connects. When your access system and cameras talk to each other, life gets a whole lot easier.

  1. Simple, Easy-to-Use Tools

Security systems don’t need to be complicated. Today, people want intuitive dashboards, mobile apps, and “single pane of glass” control. Your team shouldn’t need hours of training just to unlock a door or review footage.

  1. Mobile and Touchless Access

We live on our phones. Why not let them be your keys, too? Mobile credentials and touchless access are exploding because they’re convenient, secure, and cut down on lost badges. And yes—there are still cards or fobs for people who want them.

  1. Stronger Identity Checks

In higher-security environments, companies are layering in biometrics (like facial recognition or fingerprints) and multi-factor authentication. It’s about adding assurance without adding friction.

  1. Don’t Forget the Perimeter

It’s not just about doors anymore. Parking lots, gates, and campus perimeters are getting more attention. License plate recognition cameras and smart gates make it easier to manage vehicles coming and going.

  1. Freedom From Lock-In

No one wants to be trapped with a single vendor forever. That’s why open platforms and interoperable systems are such a big deal. They let you expand, upgrade, and mix in new tech down the road.

  1. Security That Respects Privacy

Because today’s security systems are digital, they also hold sensitive data. That means encryption, privacy, and compliance are all part of the package. It’s not just about protecting your building—it’s about protecting your business reputation, too.

You’re Not Alone, And You Don’t Have to Figure This Out Alone

Here’s the truth: every company out there is wrestling with the same challenges—outdated systems, rising expectations, tighter budgets, and confusing options. The difference comes down to having the right commercial security partner.

That’s where Kenton Brothers comes in with the KB Advantage:
  • We listen first, so we understand your current systems and pain points.
  • We design a roadmap that fits your budget and timeline, no “rip it all out and start over” nonsense.
  • We choose solutions that play well together and leave room for future growth.
  • We deliver systems your team will actually enjoy using.
  • We stay with you long-term, updating, monitoring, and helping you adapt as your needs change.
Here’s a quick example:

One client had three separate systems across multiple buildings, different vendors, different logins, constant headaches. Over six months, we migrated everything into a unified hybrid-cloud system. Now, their IT and operations teams can grant access, pull video, and track incidents, all from one simple dashboard.

Final Thoughts

If you’re feeling overwhelmed by all the choices, you’re not alone. The fact that you’re seeing these trends everywhere just proves that the industry is shifting in the same direction you’re already thinking.

The key is to move forward intentionally, with a partner who understands the technology and how it fits your world.

At Kenton Brothers, we’ve been protecting people, property, and peace of mind for more than a century. And in 2025, our promise is the same: security solutions that are easy, comprehensive, and built for you.

If you’re ready to explore your options, let’s talk. We’ll help you make sense of the buzzwords and build something that actually makes your life easier.

What is commissioning and why is it important?

What is commissioning and why is it important?By Gina Stuelke, CEO of Kenton Brothers

Tech Talk:  Physical Security, Access Control and Video Surveillance

Commissioning a new access control or video surveillance system refers to the structured process of testing, verifying, and validating that the installed system operates as designed and meets the client’s performance, functional, and security requirements.

Commissioning is the final phase of a system installation that includes a detailed inspection, programming, functional testing, and documentation to ensure all components and software are working properly, securely, and in alignment with the intended design.

Seven Key Steps in the Commissioning Process:

  1. System Verification
    • Ensure all equipment is installed per plans and specifications.
    • Confirm device placement, cable terminations, and labeling.
  2. Configuration & Programming
    • Program access levels, schedules, door groups, and alarm rules (access control).
    • Set up camera recording rules, retention periods, and motion zones (video).
  3. Functional Testing
    • Test door hardware (locks, REX, contacts) for access control.
    • Validate video quality, camera views, PTZ functions, and NVR/VMS playback.
    • Confirm integrations (e.g., elevator control, intrusion alarms).
  4. Network & Cybersecurity Checks
    • Test network performance, bandwidth, and secure communication protocols.
    • Apply firmware updates and password protection.
  5. User Acceptance Testing (UAT)
    • Walk the system with the client to demonstrate key features.
    • Validate that the system meets operational goals and expectations.
  6. Training & Handover
    • Provide training for end users and administrators.
    • Deliver documentation: as-built drawings, device lists, programming exports, and user manuals.
  7. Final Documentation
    • Sign-off sheets, punch lists, and warranty activation.
    • Record of commissioning tests and issue resolution.

Purpose

To ensure the system is safe, secure, functional, and ready for operation with minimal disruption. A commissioned system transitions from installation to operational use and support.

Six risks you face if your system in not commissioned

1. System Doesn’t Work as Intended

  • Doors may not lock/unlock on correct schedules
  • Cameras might not record or capture critical events
  • Alarm triggers and alerts may fail or be misconfigured

This leads to gaps in security coverage and false sense of protection.

2. Missed Compliance and Liability Exposure

  • System may not meet legal or industry standards (e.g., HIPAA, PCI, CJIS)
  • In the event of a security breach or incident, non-commissioned systems can be a legal liability

Could result in fines, litigation, or insurance claim denials.

3. Increased Long-Term Costs

  • Poor setup often leads to frequent service calls
  • System may need to be reprogrammed or partially reinstalled

This drives unplanned operational costs and downtime.

4. Reduced Usability and Frustrated Staff

  • Admins may not know how to use or manage the system
  • Poor user interface configuration can lead to staff workarounds or avoidance

Reduces adoption and defeats the purpose of the investment.

5. No Documentation or Baseline for Support

  • Without commissioning, there’s usually no as-builts, programming exports, or test results
  • Future maintenance and troubleshooting becomes guesswork

Hinders troubleshooting and adds time and cost to any future support.

6. Missed Integration Opportunities

  • Uncommissioned systems often skip integration with elevators, fire panels, HR systems, etc.

Results in manual processes where automation was expected.

Summary

Failing to commission a system means you could have paid for features you aren’t using, you are vulnerable to security lapses, and may have no proof the system meets requirements.

Work closely with your integrator to ensure that your system is thoroughly tested and meets your expectations! Need help? Give us a call.

The Differences Between WiFi Locks and Wireless Locks for Commercial Security

The Differences Between WiFi Locks and Wireless Locks for Commercial Security By Gina Stuelke, CEO of Kenton Brothers

In our continuing effort to educate on the various types of locks to use and for what applications, let’s check out the differences between Wireless Locks and Wi-Fi Locks.

Wireless Locks

Wireless locks are electronic locks that communicate without traditional cabling. They use technologies like Zigbee, Z-Wave, Bluetooth, NFC, or proprietary 900 MHz wireless to connect back to a central controller, gateway, or access control system.

Advantages:

  • Battery efficiency: Most protocols are designed for low power, so locks can run for months or years on standard batteries.
  • Security-grade performance: Purpose-built wireless locks (like those from ASSA ABLOY, Allegion, or SALTO) are built for enterprise-grade access control with strong encryption and reliability.
  • Scalable deployments: Ideal for buildings with hundreds of doors where full hardwired cabling is too costly.
  • Integration with access control platforms: Often tie directly into commercial access systems (e.g., Gallagher, LenelS2, C•CURE).

Use Cases:

  • Universities and hospitals (large campuses with many interior doors).
  • Multifamily housing where unit doors need centralized control.
  • Office interiors and doors that are expensive to hardwire.

The Differences Between WiFi Locks and Wireless Locks for Commercial Security The Differences Between WiFi Locks and Wireless Locks for Commercial Security

Wi-Fi Locks

Wi-Fi locks are a specific type of wireless lock that use the building’s existing Wi-Fi network (2.4 GHz or 5 GHz) to communicate directly with the cloud or access system.

Advantages:

  • Direct cloud connectivity: No need for a special gateway; the lock connects to Wi-Fi like a laptop or phone.
  • Remote management: Easy to unlock or reconfigure from anywhere via cloud platforms or mobile apps.
  • Convenient for small systems: Great for residential or small commercial setups without enterprise access control infrastructure.

Challenges (compared to wireless locks):

  • High power consumption: Wi-Fi radios drain batteries faster, so battery life may be measured in months, not years.
  • Network dependency: Performance is tied to the reliability and security of the Wi-Fi network.
  • Less scalable for enterprise: Managing hundreds of Wi-Fi devices can strain IT networks and support teams.

Use Cases:

  • Residential smart homes (e.g., Yale, August, Schlage Wi-Fi locks).
  • Small businesses with a handful of doors and no central access system.
  • Short-term rental/Airbnb properties needing remote guest management.

The Differences Between WiFi Locks and Wireless Locks for Commercial Security The Differences Between WiFi Locks and Wireless Locks for Commercial Security

Summary

  • Wireless locks (general) = Broad category, often enterprise-grade, using low-power radio protocols (Zigbee/Z-Wave/Bluetooth/proprietary). Long battery life, reliable, scalable, often integrated with professional access control.
  • Wi-Fi locks (specific type) = Convenient, cloud-connected locks using standard Wi-Fi. Easy for small systems, remote control built-in, but higher power use and less enterprise-friendly.

The Differences Between WiFi Locks and Wireless Locks for Commercial Security