Operational Security

Kroll’s sophisticated global network of experts can assist with your operational security needs, whether they are proactive to avoid enterprise risks, reactive augmentation to your current capabilities or capacity-building due to threats.
Contact Us

When your people, assets or reputation are under threat, you can rely on Kroll to deliver premier consultative advisory, risk assessment and operational security services, all supported by the latest technology and digital solutions.

Executive Protection

Kroll provides executive protection services tailored to our discerning clients. Upholding the highest levels of professionalism, adaptability and strategic thinking, we ensure our clients can conduct their daily activities safely and confidently, minimizing disruptions to their daily routines.

Our approach is sharply focused on the proactive avoidance of risks, danger or threats combined with the constant re-evaluation of the threat landscape to safeguard our clients from harm. Our goal is to prevent our clients from encountering any threat, and we maintain comprehensive contingency and emergency action plans tailored to specific operating environments.

Our personnel have expert proficiencies at the highest levels across government, dignitary, private client and corporate executive protection. Whether you need strategic, programmatic or tactical support, our experts offer a full suite of executive protection services, giving our clients the peace of mind knowing they and their families are protected.

Proprietary Information Risk Management

Many organizations trust that their most valuable information is secure behind their IT department’s firewall but may overlook assets in physical form. As teams work and develop projects involving proprietary information, distributing physical materials can often leave an organization vulnerable to theft or misuse. Kroll’s Proprietary and Critical Information Risk Management offering identifies intellectual property (IP) and other proprietary materials not actively protected by a company’s managed IT firewall, establishing robust protocols for protecting these assets.

Traditionally, organizations have managed this risk with standard physical security programs and technical security countermeasures (TSCM) inspections. While these methods are useful, they can leave gaps in the awareness and protection of assets. We advocate for a risk management program that identifies the lifecycle of these assets and manages the risks until the assets are no longer in use. Our experts provide robust assessments to establish a comprehensive program that effectively manages risk.

As there continues to be a rise in commercial and industrial espionage, as well as commodity theft globally due to various factors including inflation, supply chain disruption, international tension and geopolitical conflict, organizations need both proactive and reactive approaches to safeguard their assets. Kroll’s industry-leading experts can help you develop both comprehensive strategies to preemptively protect your organization and reaction plans if your organization has fallen victim to industrial theft, commercial or industrial espionage.

Major Event Security Planning

Hosting or attending any major event, high-profile meeting, trade show or social gathering can present numerous security concerns. Kroll provides expert personnel and consulting for event security planning, spanning multiple site analyses, physical security and access control, security vendor management, emergency preparedness and response, procedural security and best practices and evacuation planning. We also liase with local emergency services and manage any after-action items needed, including incident management and investigation.

Kroll’s expert practitioners have delivered long-range strategic planning, advanced security solutions and on-the-ground support for major events such as:

  • U.S. Presidential Inaugurations and State of the Union Addresses
  • United Nations General Assembly
  • Corporate board and shareholder meetings
  • Summer and Winter Olympics
  • Pan American Games
  • FIFA World Cups
  • World Figure Skating Championships
  • NFL Super Bowl
  • America’s Cup Regatta Races

Kroll leverages global capabilities to ensure a major event is well-planned, properly staffed and safeguarded from harm and embarrassment.

Specialized Operational Security Services

Kroll’s subject-matter experts routinely enter the field to bolster, augment, supplement or lead security and protective matters on behalf of our clients. We specialize in responding swiftly and safeguarding your people, property and reputation from threats of any nature. Deploying personnel with precisely the necessary skillsets, our offerings include but are not limited to:

  • Protective surveillance and surveillance detection
  • Executive protection
  • Residential overwatch
  • Augmented office security
  • Explosive ordinance disposal (EOD) and K-9 teams
  • Roving patrol/Boundary probe monitoring
  • Police liaison
  • Threat management experts
  • Forensic psychologists and psychiatrists
  • Strategic communications

Security and Risk Management Consulting

Kroll’s team excels at proactive security consulting and expert advisory solutions, aligning our comprehensive offerings with your enterprise’s risk appetite. We offer personnel, expertise, advisory and bandwidth when our clients are challenged in ways that stress their comfort or internal capabilities.

Business Continuity, Resilience and Disaster Preparedness

In today’s fast-paced world, disruptions can happen anytime. Kroll’s full suite of business continuity, resiliency and disaster preparedness capabilities is designed to prepare your enterprise for unexpected risks and maintain competitiveness throughout the full lifecycle of any disruption.

Threat Management, Workplace Violence and Active Assailant Advisory

Kroll specializes in the precise and carefully measured application of threat management principles to thwart your organization’s most compelling threat actors while continuously maintaining control of its safety, principles and reputation.

 

Crisp: Online Risk Detection

Crisp is a Real-time Risk Intelligence solution that protects brands, assets and people from reputational damage, security threats and online harms. Our AI technology, coupled with our expert human intelligence teams, has been trained over 16 years to discover and track the risk signals embedded within digital chatter that originate or become amplified online by actor groups across the surface, deep and dark web. Learn more about Crisp.

Get in Touch

Crisp is a Real-time Risk Intelligence solution that protects brands, assets and people from reputational damage, security threats and online harms. Our AI technology, coupled with our expert human intelligence teams, has been trained over 16 years to discover and track the risk signals embedded within digital chatter that originate or become amplified online by actor groups across the surface, deep and dark web. Learn more about Crisp.

Get in Touch

Digital Technology Solutions

Crisp: Online Risk Detection

Digital Technology Solutions
Enterprise Risk

2023 Europe and Africa Security Trends: Business Resiliency Takes Center Stage

March 8, 2023
Enterprise Risk

2023 North America Security Trends: Staying Ahead of Modern-Day Risks

February 22, 2023
Threat Management
Webcast Replay

Threat Management

October 12, 2020
Threat Management
Crisis Management Post COVID-19 - The Value of the Virtual Security and Crisis Manager
Webcast Replay

Crisis Management Post COVID-19 - The Value of the Virtual Security and Crisis Manager

July 13, 2020
Crisis Management Post COVID-19 - the Value of the Virtual Security and Crisis Manager

Frequently Asked Questions

A technical surveillance countermeasures (TSCM) sweep, more commonly known as a bug sweep is a highly sophisticated process in which our specially trained technicians search for hidden listening devices, including recording, video, audio or blast transmission tools. These tools are often implemented in areas where secure conversations occur as part of an espionage campaign or by individuals for nefarious purposes. This typically happens in an organization’s most sensitive spaces, such as executive boardrooms or other locales where strategic-level decisions and conversations take place.