Security Planning

Architecture, operations and electronic systems comprise our security planning philosophy—a core component when designing comprehensive security programs for companies globally.

Contact us
/en/services/security-risk-management/security-systems-consulting/security-planning service

While many consultants view security strictly from the electronic system perspective, our security planning philosophy is grounded in our experience designing comprehensive security programs for clients across a multitude of industries. In our approach, we balance the three basic elements of security: architecture, operations and electronic systems.

Under this philosophy we use proven industry best practices to design a security program based on three recognized security principles: Crime Prevention through Environmental Design (CPTED), Concentric Circles of Protection and Integrated Design Philosophy.

Elements of Physical Security

Crime Prevention Through Environmental Design (CPTED)

CPTED uses passive resources such as architectural barriers, landscaping and lighting, to decrease the need for traditional technical and operational security elements necessary to reduce vulnerability to crime.

Concentric Circles of Protection

The concept of Concentric Circles of Protection is based on varying levels of protection. Typically, these layers start at the site perimeter and move inward to building perimeters, interior spaces and specially controlled areas. As the levels of protection increase in number and/or rigor, the ability to penetrate to the most critical areas becomes increasingly difficult. Likewise, the potential for detecting the attempted penetration improves.

Integrated Design Philosophy

Integrated Design Philosophy establishes effective security through the integration of electronic systems with architectural elements, enhanced by operational procedures. By integrating all these elements, we create a synergy that meets the desired security needs.

See all servicesStay Ahead with Kroll

Valuation

Valuation of businesses, assets and alternative investments for financial reporting, tax and other purposes.

Compliance and Regulation

End-to-end governance, advisory and monitorship solutions to detect, mitigate and remediate operational security, legal, compliance and regulatory risk.

Corporate Finance and Restructuring

Comprehensive investment banking, corporate finance, restructuring and insolvency services to investors, asset managers, companies and lenders.

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Environmental, Social and Governance

Advisory and technology solutions, including policies and procedures, screening and due diligence, disclosures and reporting and investigations, value creation, and monitoring.

Investigations and Disputes

World-wide expert services and tech-enabled advisory through all stages of diligence, forensic investigation, litigation and testimony.

Business Services

Expert provider of complex administrative solutions for capital events globally. Our services include claims and noticing administration, debt restructuring and liability management services, agency and trustee services and more.

See all insightsExplore insights
Episode 18

Business Resiliency in Times of Conflict

Mar 30, 2022

by Nick DoyleMatthew J. Dumpert

Podcast

Security Concepts

Oct 12, 2020

Video Library

Security Risk Management –
Hear Ongoing Global Security Insights From Our Security Risk Management Experts

Webcast Replay

Threat Management

Oct 12, 2020

Connect with us
Roy Parks
Roy Parks
Senior Manager
Security Risk Management
Phone
Emily A. Baum
Emily A. Baum
Senior Manager
Security Risk Management
New York
Phone