Commercial Security and Video Surveillance Project in New Mexico… with a rare find!

By Neal Bellamy, IT Director at Kenton Brothers.

In July, we were tasked with converting several banks in New Mexico to new security and video system. No two branches were alike. Some had analog video, some had digital, sometimes there was a Honeywell panel, sometimes DSC, sometimes no panel at all. And just like any road trip, it can’t be perfectly smooth, there have to be some bumps.

Our two adventurers this time were Terry McCurdy and Ryan Holtshaus.

New Mexico ProjectThey loaded up the van and began their merry journey just after the fourth of July weekend. In the end, they converted seven branches to Honeywell intrusion panels and Milestone Video management, but it’s the stuff in the middle that makes it the best.

At some point in the trip, they needed some more BNC connectors. Even though the guys had left “loaded for bear”, they had used up all of their supply of those connectors and needed more. For those of you who don’t know… BNC connectors have kind of gone the way of the dodo bird. They used to be everywhere, but now they are much harder to find in a store.

In Kansas City, I can only think of 2-3 places where we can get BNC connectors. In Santa Fe, there’s only one.

A-1 Communications to the rescue!

A-1 Communications in New MexicoTerry said the store was really cool. It was full of modern-day electronics like you would expect, but what made it cool was the older electronics. One such piece of art was a tube tester that the owner had created. It‘s amazing to me how much skill was required to make electronics years ago.

When Terry was done with his purchase, the man behind the counter said, “Let me put those in a bag for you.” After he was done, he asked, “Do you know why I put them in a bag for you?” Of course, Terry didn’t know. The man said, “So when you lose them, you lose all of them and have to come back.” Ha! How’s that for truth in advertisement?

When you’re out of town, you have to enjoy the local treats.

The guys had dinner at the Church Street Café. This establishment was owned as a home for 400 years and then turned into a restaurant. The restaurant has some amazing southwestern features and great food. (The guys give it two-thumbs up.)

Overall, it was a long two weeks, but the customer was thrilled with the success of the project. They commented to me after it was all done that they were impressed with Terry and Ryan’s tenacity and creativity towards creating solutions. It was great to hear that… that’s why we’re here. To solve the customer’s problems and have some adventures along the way. Here’s to the next time, we’re on the road!

Church Street Café

Hospital & Healthcare Security Systems: A Healthy Approach to Security & Beyond

Medical Security Solutions

Healthcare security systems involve far more than basic security products. These systems, when integrated with logical, comprehensive solutions and technology, keep a hospital or facility’s people and assets safe. When everything is secure, a hospital can confidently move forward in achieving its real mission: providing patients the best possible care in the safest environment possible.

Security as a Means to Protect Patients and Staff

Unified Access Control

Unified access control allows you to assign levels of facility and area access based on staff function. Paired with video surveillance, it allows for active medical facility monitoring and recording activity, as well as global and departmental lockdown capabilities. Integrating access control and video provides centralized control for easy administration and management.

IP Video Surveillance

Take advantage of your existing network by connecting IP video surveillance to it. Strategic installation offers a clear view of patients and facilities. Surveillance signage can deter unsafe and would-be criminal acts. Captured images can be used as evidence and to identify individuals.

Staff Security & Protection

Staff’s badges can be equipped with wireless call functionality. Paired with wall-mounted devices, staff can discreetly summon help over your wireless network or current Wi-Fi. With an active-RFID, RTLS badge, staff members press or pull it when they need assistance or are facing a threatening situation. RFID technology detects their specific location, so responders can arrive quickly.

Intrusion Detection Systems

Your healthcare facility’s needs and layout determine recommendations for the latest options in intrusion detection. Many options, ranging from minimum to maximum solutions, are available to fit staff and patient needs.

Emergency Notification Devices

Quickly and concisely guide people out of harm’s way whether they’re inside your hospital or on the grounds or parking areas. Incidents are triggered via buttons, consoles, panels and inputs. Designate notification channels. Then, provide emergency directions through communication systems, such as media displays, phone, text, PA systems and more.

Wandering, Elopement and Fall Detection

Track patients or residents with technology features that give them a better quality of care, give families and staff peace of mind, and allow your operations to flow more smoothly. Once sensors and tags are in place and the detection system is deployed, users receive an alert and quickly respond if someone wanders, strays or falls to improve care and minimize risk.

Infant Protection

Protect your most vulnerable patients and give staff and new parents peace of mind. Through comfortable tags with tamper alarms and integration with infrastructure, such as access control systems, door locking systems and security cameras, staff can protect infants and focus on their care.

Security as a Means to Create the Safest Healthcare Environment Possible

Asset & Equipment Management

Mark mobile medical equipment with asset tags, which seamlessly communicate with existing systems to provide exact location and condition. In addition to controlling inventory, medical staff can quickly locate then access critical medical equipment, speeding up workflow and delivering better overall patient care.

Environmental Monitoring

Meet compliance standards and prevent product loss with environmental monitoring. Record and track temperature and condition data of mission-critical medicines, vaccines, blood and lab samples to ensure all are safe and ready for patient use. Save time and money by eliminating the need for manual reporting and recording data remotely.

Global Threat Reduction Initiative (GTRI)

Prevent terrorists from obtaining materials that can be used in radiological attacks by implementing security requirements established in the GTRI framework of convert, remove and protect. Hospitals support the initiative with remote monitoring, access control systems, alerting local law enforcement of an event, disposing properly of unused radiological and nuclear materials, and protecting radiology and nuclear medicine equipment still in use.

When it comes to hospital security systems, there are many factors to consider – from the type and size of your facility and the type of medical inventory to the people who work and visit there every day. The goal is to secure people and assets from every imaginable internal and external threat. Yet, unless regulations, your equipment or your surrounding community dictates it, you want your hospital secure, yet a welcoming space where your staff can carry out your true mission, caring for patients in a safe environment.

Schedule your hospital security systems consultation by calling us at 816-842-3700.

The Kenton Brothers Retail Counter [Video]

By Ryan Kaullen

Kenton Brothers can trace its customer service roots back to 1897. Our Retail Counter, customer-facing environment is at the forefront of service for our customers. Every day, our customers are coming in with various needs as a result of their businesses growing and evolving. That’s where the Kenton Brothers Retail Counter comes in. It’s a resource for their overall facilities physical security needs. Those needs come in the form of keying, part repairs, parts ordering, security needs, and knowledge database.

Our customers rely on the Retail Counter to be the gatekeepers for physical security at their facilities. Our internal database of records is guarded by checks and balances specifically outlined by our customers. Approvals must be followed every time. The Retail Counter staff works tirelessly to make sure requests are correctly followed and delivered on time.

Over the years, the Retail Counter has grown from a key shop to a full service solution for our customers.

The Retail Counter can help customers create and manage key systems, duplicate keys, re-key, order parts, repair parts and the list goes on. We welcome local walk-ins every day, but not all of our customers are local. We have customers across the country that rely on our knowledge and products to protect them. One day the Retail Counter Staff is cutting keys for a customer in Texas and the next they’re working with a customer in Arizona. We have thousands of key blanks and cylinders on hand, thousands of lines of in-stock product, as well as thousands more available through our vendors, and decades of experience to back it up.

From the entire Kenton Brothers staff, we invite you to allow Kenton Brothers and the Retail Counter Staff to help protect the people, property, possessions, you hold dear.

Partnering with Homebase to offer Multi-Family “Smart Home” Technology

By Neal Bellamy, IT Director at Kenton Brothers

Smart home technology has been around for a few years. It’s the ability to control lights, thermostats, locks and more in your home using an app or a remote control. It’s building automation for your home. If you own a condo or an apartment complex, how can you offer the smart home experience to your tenants? Can you use the same products as a single-family home or a commercial building?

Let me show you how partnering with the right people can make smart home tech another bonus for your complex.

First of all, the typical smart home and commercial products aren’t a great fit for multi-family buildings. Most of the building is made up of individual “homes” with each home needing to have their own control over locks, lights, etc. However, there are also common areas in a commercial building including a gym, pool or front entrance that every tenant will need access to.

Kenton Brothers: Homebase LogoYou may need an intercom system to call a tenant if they have a visitor. To accomplish the task, you need two experts. One in Smart Home and the other in commercial security systems. Partnering with Homebase, Kenton Brothers has helped several multi-family facilities offer smart home tech to their clientele.

Homebase offers a tenant all of the smart home features like automatic locks, lights and thermostats. However, they also solve the problems associated with an apartment or condo like move in/move out, demo unit access, dog walker or cleaning service access through the front and tenant doors. They also offer a maintenance ticketing system and shared space access for all tenants.

Kenton Brothers: Smart Home SolutionsKenton Brothers makes sure that the right locking hardware and other security systems are in place and integrated.

Not every “smart” lock is ready for this application. Different doors will have different needs for intercom, access control, and/or smart home. An electrified lock on the front door of the complex will be very different than the door to a unit, but both need to be compatible with the building automation, or smart home system. The intercom system needs to call tenants wherever they are because many people no longer have land lines.

For more information, click here to download our guide for “Top 11 Solutions for Multi-Family Properties”

If you want to offer smart home functionality for your tenants, give us a call. We’ll partner with you and Homebase to integrate the different systems and features to create the right environment for you and your tenants.

How does a security integrator design their own security systems? Part 3

By Neal Bellamy, IT Director at Kenton Brothers

In the last couple of months, we’ve been designing our intrusion system, network infrastructure, and video surveillance systems. Now it’s time to design the access control system.

Access Control

There can be lots of advantages to Access Control.

Because the doors are controlled electronically, we can:

  • Automate the open and close time of the business or areas
  • Stop handing out keys that might not be turned back in or lost
  • Track who goes where, etc.
  • Use access control doors for business reasons, not just for security.

Kenton Brothers: Access Control and LocksFirst, let’s talk about the components of access control. A couple of the components are obvious, but others are misunderstood. Today we’ll talk about card readers, locks, door position sensors, request to exits, and credentials. Exciting, right? Maybe not, but these are incredibly important details for a commercial security system.

Card Readers

Card readers are the most obvious component required in an access control system. The card reader is what reads your access control card and identifies you to the system. Your card is unique to you within your access control system. However, a card reader doesn’t have to be just a card reader.

There are lots of ways to identify yourself to the system. Fingerprint readers, vein readers, pin pads, iris scanners, and face scanners are all possible ways that you could be identified. Some of these are more secure than others. Pin numbers can be shared, so we highly suggest not using them, or make sure that whatever you have behind the door is not valuable.

Fingerprint readers are more hackable (YouTube Video about that here) than a vein, iris or face scanners. The highest level of security is two-factor authentication. You would use two of these kinds of credentials to enter the door at the cost of being less convenient.

Locks

Kenton Brothers: LocksLocks are the next most obvious component. You need to be able to lock and unlock the door electronically. Common electronic locks are Electrified Panic, Electrified Levers, Strikes and Mag (magnetic) locks.

All electronic locks can be broken into two categories, “Fail-Safe” or “Fail-Secure”.

Fail-Safe locks unlock when there is no power going to them. When the power “Fails” the lock is “Safe”. In this case, “Safe” means someone can get out. Unfortunately, that also means that the door is unlocked, so someone could come in if the power fails.

Fail-Secure is the opposite; when the power fails, the lock is secure or locked. There are times when codes require a Fail-Safe lock, like in a stairwell of a large high rise, however, at Kenton Brothers we prefer fail secure locks.

Electrified Panic, Electrified Levers, Strikes can all be Fail-Secure or Fail-Safe, but mag locks are always Fail-Safe. Mag locks usually require two forms of egress, meaning that there are two ways to leave the building through a mag lock. Mag locks generally are also required to be connected to the fire alarm. Although Mag locks themselves can be cheaper than other types of locks, by the time you connect the two forms of egress and the fire alarm, you could have installed a Fail-Secure lock.

Door Position Switches

Now you can authenticate at the door with a reader and unlock the door with an electrified lock. But how do you know if someone propped open the door, or forgot to shut it? That’s where the third component at the door comes in, the door position switch.

This switch is generally a magnetic switch mounted in or on the door that tells the system if the door is open or closed. You can use this information to drive alerts if a door is left open too long, which circumvents the security that you are trying to establish with access control.

Wouldn’t it be nice to know if someone opened the door that was unauthorized?  With the door position switch, we can tell the door opened without a card read, but it would also alert us when anyone leaves the building.

Request to Exit

We use a second type of switch to tell us when someone is leaving the building called a “Request to Exit”. This can be a motion detector that triggers when someone gets near it, or it can be built into a lever or exit bar. That way, if the doors opens, but the request to exit was not triggered and the reader was not used, we know someone came in from the outside and was not authorized. This is called a “Door Forced”. The door was forced open with key or crowbar.

Credential

The last component is a credential. We say credential, not card, because we can use a key fob, iris, face, fingerprint or other identifying feature to authenticate to the system. Most systems use a card or key fob, because of cost and ease of use. However, not all cards and key fobs are the same.

There are dozens of technologies that can be used to store and transmit the credential number to the system. Some are proprietary, some are open, some are not-encrypted and some are. Generally, we advise clients to use a “Smart Card” technology that is encrypted, but not proprietary. It provides the security of encryption while allowing the technology to be compatible with most access control systems. Some options even guarantee that your exact credential number will never be available to any other company in the world, while also being non-proprietary and encrypted.

So What Will Kenton Brothers Be Using?

Whew, that was a lot of info! Now let’s talk about the solution we’re going to use at Kenton Brothers.

Our exterior doors need to be secure, while some of our interior doors are really just for traffic control. We will control our space while also controlling the tenant space. There’s an overhead garage door leading from our space to a space shared with the tenants. We also have an overhead garage door for loading and unloading material that we don’t want to have to get out of the truck to open.

For the exterior doors, we’ll install an electrified exit bar with a built-in request to exit. The exit bars are heavy duty and allow a large number of people to get out of the building. The built-in request to exit also gives less false triggers than motion detectors, because instead of triggering when someone gets close, it only triggers when someone actively leaves the building by presses the bar down. These doors will also get a door position sensor.

The interior doors will be strikes or electrified levers. Although these locks are still rated as “Heavy Duty” they are a little less expensive and won’t see as much use.  We will still use request to exits in the electrified levers, for the same reason as the exit bars. We’ll still use a door position sensor to make sure the doors are closed.

The overhead doors will be controlled by door operators, kind of like your garage doors at home. We’ll tie those into the access control system.

For the readers, we’ll use HID iclass SE. These are non-proprietary, encrypted readers, which can also be used with Bluetooth credentials. Right now, they will connect with the Weigand protocol, an open standard communication between readers and access control systems. They can also use a newer, more secure OSDP protocol when the access control systems are ready.

For the long range reader at the exterior overhead door, we’ll use a Nedap reader that can read a special credential at distances up to 33 feet away. That way, the door can be opened without leaving the comfort of the truck.

Thanks for joining me on this physical security journey for our new building. We are really excited to create a showpiece of security layers and technologies.

Please stop by this summer to see everything we’re integrating to create a holistic security stance!