Security Operations Center – Video Wall Upgrades

By Neal Bellamy, IT Director at Kenton Brothers

Security Operations Center - Video Wall UpgradesWhen you have a security operations center, a common component is a video wall. A video wall enables your officers to maintain situational awareness by displaying information from multiple systems simultaneously. Often, the video wall will evolve over time to become more and more helpful. Recently, we helped a customer take their video wall through their next evolution.

Video walls can be as simple as a PC with two screens, or can be monstrous walls with LCD tiles connected to make one seamless huge display with video wall drivers connected to dozens of PCs. Usually, there is a balance between flexibility and cost.

The History

Our customer’s current video wall setup was left over from their original analog video camera installation from the 90s. It started as a large security console for two officers. It was about 12 feet wide and 5 feet tall, and sat in the middle of the room. Originally, it had old-school CRT TVs mounted in the console, but over the years, the CRTs were replaced with LCD TVs. While the video wall served its purpose, there were several areas that were not ideal.

The screens faced the visitor window, which made it easy for visitors to see what was going on at the facility, but also made it hard for an officer to know when a visitor came in. There were multiple PCs running the various systems, each with its own keyboard and mouse. Finally, the replacement TVs were mounted wherever they fit, which left the TVs mounted at different depths, making the video wall less than seamless.

The facility wanted to go through a refresh of the entire room, and asked us to help with the video wall. Of course, we jumped at the chance. The shape and size of the room made the design a little challenging, but ultimately, we were able to help their video evolve to the next level.

The Update

Security Operations Center - Video Wall UpgradesThe new space faced the visitor window, which also turned the displays away from the visitors. Next, we chose the largest commercial displays that would fit into the space. Then we designed the rest of the displays around those. They had several displays that could be reused, which helped reduce the cost of the overall project.

We chose mounts that allowed for the displays to be tightly tiled, which created a more seamless experience. Finally, we installed a KVM (Keyboard Video Mouse) device that allowed for a single keyboard and mouse to drive all five PCs in the background. This helps the officers switch between systems without having to switch keyboards or mice.

Do you need help refreshing or updating your security operations center? Give us a call. We will help you get there.

The Importance of Security Policies and Procedures in Physical and Electronic Security Systems

By Kevin Whaley, CPP, Sr. Security Consultant at Kenton Brothers

The Importance of Security Policies and Procedures in Physical and Electronic Commercial Security SystemsOrganizations today face a wide range of threats—from theft and workplace violence to unauthorized access and cyber-physical attacks. In response, many invest in electronic security systems like access control, video surveillance, and intrusion detection. While these systems are critical, technology alone doesn’t create security.

Effective security requires a foundation of well-developed and consistently implemented policies and procedures. These documents ensure that systems are used properly, responsibilities are clear, and responses to incidents are fast, coordinated, and effective. This paper outlines why formalizing your security operations matters, how it directly impacts both electronic and physical security, and why cross-departmental input is essential.

Why Policies and Procedures Matter

Security policies define expectations. Procedures explain how those expectations are carried out. Together, they provide the structure and consistency that technology and personnel rely on to function effectively.

Without them:

  • Access rights are inconsistently assigned.
  • Cameras go unchecked.
  • Intrusion alarms are ignored or mishandled.
  • People are unclear about their roles during an incident.

With them:

  • Teams work from the same playbook.
  • Leadership has documentation to support enforcement and accountability.
  • Audits, investigations, and compliance checks become easier to manage.
  • Risk is reduced, and system ROI increases.

In short, policies and procedures are the operating system of your security program.

Applying Policy to Electronic Security Systems

Every piece of electronic security technology should have an accompanying set of procedures. Without clear documentation, even advanced systems are prone to misuse or failure.

Access Control:

  • Credential issuance and revocation protocols
  • Access level structuring (based on job function, location, etc.)
  • Temporary and contractor badge handling
  • Access audit review timelines and reporting responsibilities

Video Surveillance:

  • Camera placement policies (to avoid privacy violations)
  • Storage retention durations
  • Video export handling and chain of custody
  • Preventive maintenance schedules

Intrusion Detection:

  • Arming/disarming procedures
  • Alarm verification and dispatch protocols
  • Response documentation and escalation
  • Testing and performance logging

Too often, organizations install these systems and consider the job done. But without usage and response protocols, the systems are just expensive hardware with little operational value.

Extending Policy to Physical Security Measures

Policies also apply to physical security: fencing, bollards, gates, secure rooms, and other structural protections.

Examples include:

  • Perimeter inspection checklists
  • Lock and key control processes
  • Facility lockdown and shelter-in-place procedures
  • Evacuation plans integrated with intrusion or fire systems

In many cases, the intersection between electronic and physical security—like doors controlled by access control systems—requires even more careful coordination.

Stakeholder Collaboration: Essential, Not Optional

Developing policies in a vacuum leads to confusion, conflict, or noncompliance. Involving other departments ensures policies are realistic, enforceable, and aligned with larger business goals.

Who to involve:

  • IT – Ensures cybersecurity and network requirements are met.
  • HR – Connects personnel actions (e.g., termination) to security events.
  • Legal/Compliance – Helps ensure documentation aligns with regulatory standards.
  • Facilities – Coordinates physical access and maintenance.
  • Executives – Provide buy-in, funding, and top-down support.

Cross-functional development also improves adoption. People are more likely to follow procedures they helped shape.

Governance and Continuous Improvement

Security policies and procedures should evolve with the organization. Review cycles (at least annually or after a major incident or system upgrade) are critical.

Recommendations:

  • Assign ownership to a security governance team or designated lead.
  • Track metrics like response time, false alarms, and audit findings to guide updates.
  • Maintain version control and clearly communicate updates to all relevant staff.
  • Integrate training to ensure procedures aren’t just documented—they’re understood and followed.

Conclusion

Policies and procedures aren’t just a checkbox—they are the foundation of any effective security program. They give your systems direction, your team clarity, and your organization resilience. Whether you’re managing electronic systems, physical infrastructure, or both, documented policies create consistency, reduce liability, and ensure your investment in security delivers long-term value.

And just as important, the process of building these documents—especially in collaboration with other departments—creates alignment, builds awareness, and strengthens your overall security culture.

Do you need help with your security policies and procedures? Give us a call.

Revolutionizing Secure Communication: A Deep Dive into Zenitel’s Intercom Systems

By Neal Bellamy, IT Director at Kenton Brothers

Revolutionizing Secure Communication: A Deep Dive into Zenitel’s Intercom SystemsA Legacy of Excellence

With roots dating back to 1901 and U.S. operations beginning in 1978, Zenitel has established itself as a leader in communication technology. While U.S. operations are headquartered in Kansas City, its influence spans across the country. This long-standing history and deep local connections serve as key differentiators, reinforcing the company’s reputation as a trusted provider.

Unparalleled Intercom System Features

At the core of Zenitel’s success is its commitment to superior audio quality, ensuring intelligibility and reliability in every interaction. The system boasts broad interoperability, seamlessly integrating with various access control and video management platforms. Advanced features like automatic noise reduction, auto volume adjustment, and robust cybersecurity measures make these intercoms indispensable for modern security infrastructure.

A Product Line for Every Environment

The company offers a diverse range of intercom solutions, tailored for various applications:

  • Audio-Only Stations – Simple yet effective for standard communication.
  • Video-Enabled Units – Enhancing security with real-time visuals.
  • Vandal-Resistant Models – Built for durability in high-risk environments.
  • Specialized Stations – Designed for clean rooms, explosion-proof settings, and emergency response applications.

From basic intercom stations to touchscreen models with video capabilities, the product lineup ensures customers can find the perfect solution for their needs.

A Deep Dive into Zenitel’s Intercom SystemsSeamless Integration & Strategic Partnerships

A major strength of Zenitel is its integration capabilities. The system works effortlessly with top-tier access control providers, including Gallagher and Lenel, as well as leading video management systems like Genetec and Milestone. The company is actively expanding compatibility with modern communication platforms such as Microsoft Teams and Webex, ensuring smooth collaboration across enterprises.

Diverse Applications Across Industries

Zenitel’s intercom systems serve a wide range of sectors, reinforcing safety and communication in:
Education – Securing schools and campuses.
Healthcare – Enhancing patient care and facility protection.
Government & Public Infrastructure – Supporting security and emergency response.
Manufacturing & Industrial – Ensuring seamless operations in large-scale enterprises.

With a focus on critical security needs, these intercoms are designed for high-stakes scenarios, including active shooter response and area-of-rescue emergencies.

Shaping the Future of Secure Communication

With a rich legacy, cutting-edge innovation, and a commitment to seamless integration, Zenitel is setting new standards in secure communication. Whether in hospitals, airports, corporate campuses, or industrial settings, its intercom systems provide the reliability and security organizations need to thrive.

Looking ahead, the company continues to push the boundaries, ensuring that businesses and institutions worldwide stay connected, protected, and prepared.

Is it time to upgrade your intercom system? Give us a call and we will help you determine if Zenitel is the right answer for your business.

Gallagher: Changing the Commercial Security Industry with QuickSwitch

Gallagher: Changing the Commercial Security Industry with QuickSwitchBy Gina Stuelke, CEO of Kenton Brothers

Is the cost and time of upgrading your security system holding you back? You might want to know about Gallagher QuickSwitch.

QuickSwitch gives businesses a streamlined, simplified pathway to migrate from legacy access control systems to Gallagher’s world-class commercial security solution. True to its name, installation is fast, reducing labor costs and minimizing disruptions typical of a complex migration process. Most importantly, QuickSwitch helps businesses mitigate risks associated with legacy systems, creating peace of mind through a platform that unlocks greater value.

With three variants, each covering multiple boards, businesses are empowered to make the switch from a multitude of systems. In significantly less time than a traditional migration, and for a fraction of the cost, businesses looking to make a change can be on their way toward unlocking more from their security systems.

Gallagher: Changing the Commercial Security Industry with QuickSwitchAn interview with the Gallagher team helps to define what this innovative solution can do for access control:

“What makes QuickSwitch special is that it’s pure Gallagher I/O, so you get that rock-solid Gallagher reliability, but with industry-familiar form factor and shape,” explains Jeff Ogborn, Senior Solutions Engineer. “Our approach gives us the ability to have multiple different looking I/O running on the same software headend, offering unmatched reliability. We’ve also upgraded the tech inside and given it a cool Gallagher orange look.”

Dave Solly, Product Manager, details what that value looks like and calls QuickSwitch a shortcut to accessing a long list of Gallagher’s industry-leading solutions.

“Gallagher Security has been at the forefront of security innovation for nearly 40 years,” Solly explains. “QuickSwitch not only gives businesses immediate access to our market-leading solutions, it also gives people access to a team of experts who genuinely believe in customer centricity. That means decades of experience delivering full-scale support on top of solutions that increase efficiency and productivity. QuickSwitch is a direct portal to all of that and a lot more.”

Ogborn agrees and takes it one step further:

“Gallagher’s QuickSwitch program tackles the biggest problem in the industry: cost. Channel Partners find changing systems too expensive, and ‘rip and replace’ is a no-go. End Users also struggle with the time and cost to convert, including hardware, business downtime, and overall TCO. We understand the issue and have an answer. Getting the full story – hardware, application, and database extraction – is a must for anyone who has an interest and needs the full benefit.”

To learn more about QuickSwitch and how it may help you in your next major commercial security system upgrade, please contact us.

Enlightened Security: The single greatest defense in a security system.

By Baer Halvorson, Security Systems Engineer at Kenton Brothers

Enlightened Security: The single greatest defense in a security system.Randomized Control Experiments are considered to be one of the most effective ways to study cause-and-effect relationships. This method helps minimize biases by randomly assigning participants to either a treatment group (which receives the intervention) or a control group (which does not), ensuring that any differences between the groups can be attributed to the intervention itself, rather than other variables. This method is the gold standard in several major industries like medical intervention, psychology and more.

In 2018, working alongside the Mayor’s Office of Criminal Justice, the New York City Police Department, and the New York City Housing Authority, a research team called The Crime Lab, carried out a six-month randomized controlled trial at nearly 40 public housing developments with high crime levels. Half of these developments were outfitted with new, temporary street lights, while the other half remained unchanged.

Results from the study showed that there was a 39% reduction in index crimes (murder, rape, burglary, motor-vehicle theft, etc.). This percentage deduction in the world of criminological studies is an extreme result in deterring crime. While studies will show video surveillance and alarms reducing at a rate of 30-60% this is often attributed to one or two specific crimes, like robberies or burglary. 39% across all index crimes is a significant reduction and should be something that security consultants lead with.

Hardening Your Property With Lighting

If you are looking to harden your property (commercial or residential), even if you currently have a security system in place, you should consider adding lighting in areas that you might see activity. There are a couple of ways to implement lighting onto a property.

Triggered Lighting

Integrating lighting into something like motion or as a trigger to an alarm is a very effective way to create the appearance of presence. Motion lighting can often be very effective in giving the appearance that someone has turned the light on and caught the threat in the act. This extra bit of psychological strain on an attacker can cause them to instinctually flee the scene.

Lighting can also be activated by a triggered alarm; for example if the front of a property is being breached and a shock sensor goes off because the intruder is trying to kick in the front door, having an alarm trigger the lighting in an office to turn on, or click upstairs lighting on in a house can be a very effective way to deter an attempted intrusion.

Area Lighting

Parking lot lighting and adequate lighting around the property can help assure that threats or attackers can’t lie in wait or find a dark area to access the building from. Lighting around the property also gives surveillance cameras an advantage by bolstering the field of view, pushing visibility that much further. Landscape lighting can be the means to this end without sacrificing aesthetics.

Getting a consultation from a security integrator and taking their lighting recommendations to a landscaping company can be one way to assure that you are hardening a site without making it look like a prison.

Dynamic Lighting

There are also creative ways to use lighting to accomplish specific needs and provide solutions to a site. For instance you can use zoned threat-based activation in perimeter response lighting. This is where instead of just using motion sensors or alarm-triggered lighting, you can layer lighting activations to respond dynamically based on detected movement.

For example, motion on the outer fence line activates perimeter flood lights, moving closer to the building, additional higher-intensity security lights activate in stages, creating an escalating deterrence effect. Strobe and pulsing lights can also be used as a deterrent, whether that’s on the outside of the building to act as a natural surveillance and pull eyes to where the intruder is, or in interior situations to confuse and cause panic in an intruder.

Using different colors to communicate what is happening, using up-lighting at entrances to make it difficult to see in, but easy to see out and integrating lighting into building automation, access control or video surveillance are all ways that lighting can be used to strengthen a security system.

Let’s Talk Lighting!

Light is one of the most underrated and most research-proven, effective ways to deter criminal activity on a property. Access control, intrusion detection and video surveillance can all be improved when integrating these systems with light. When pondering on how to strengthen the security around your business or home, consider first if adding light can deter the criminal. We can help you lock in your lighting security solution. Give us a call!