Security Planning

Architecture, operations and electronic systems comprise our security planning philosophy—a core component when designing comprehensive security programs for companies globally.

While many consultants view security strictly from the electronic system perspective, our security planning philosophy is grounded in our experience designing comprehensive security programs for clients across a multitude of industries. In our approach, we balance the three basic elements of security: architecture, operations and electronic systems.

Under this philosophy we use proven industry best practices to design a security program based on three recognized security principles: Crime Prevention through Environmental Design (CPTED), Concentric Circles of Protection and Integrated Design Philosophy.

Elements of Physical Security

Crime Prevention Through Environmental Design (CPTED)

CPTED uses passive resources such as architectural barriers, landscaping and lighting, to decrease the need for traditional technical and operational security elements necessary to reduce vulnerability to crime.

Concentric Circles of Protection

The concept of Concentric Circles of Protection is based on varying levels of protection. Typically, these layers start at the site perimeter and move inward to building perimeters, interior spaces and specially controlled areas. As the levels of protection increase in number and/or rigor, the ability to penetrate to the most critical areas becomes increasingly difficult. Likewise, the potential for detecting the attempted penetration improves.

Integrated Design Philosophy

Integrated Design Philosophy establishes effective security through the integration of electronic systems with architectural elements, enhanced by operational procedures. By integrating all these elements, we create a synergy that meets the desired security needs.

/en/services/security-risk-management/security-systems-consulting/security-planning /-/media/feature/services/security-risk-management/security-systems-consulting-desktop-banner.jpg service

Security Systems Consulting

Contact Us

Other Areas We Can Help

Security Risk Management

Security Risk Management

Helping clients anticipate/respond to a myriad of facility, operational and employee security challenges.

Security Risk Management
Security Consulting

Security Consulting

Threat assessments, policy review and development, and master planning.

Security Consulting
Operational Security Services

Operational Security Services

Resolve a myriad of issues such as workplace violence, corporate espionage, supply chain disruption, etc.

Operational Security Services
Resilience Consulting

Resilience Consulting

Services include assessments, plan designs, drills and emergency security services.

Resilience Consulting
Supply Chain Risk Management Services

Supply Chain Risk Management Services

Helping clients build resiliency by proactively identifying, assessing, mitigating and monitoring their hidden supply chain risks.

Supply Chain Risk Management Services
Cyber Risk

Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk

Insights

Podcast

Kroll’s Security Concepts Podcast

Podcast
Video Library

Security Risk Management –
Hear Ongoing Global Security Insights From Our Security Risk Management Experts

Video Library
Webcast Replay

Crisis Management Post COVID-19 – The Value of the Virtual Security and Crisis Manager

Webcast Replay