Kroll

HQ Address

600 Third Avenue, 4th Floor, New York, NY 10016, United States

Website Address

www.kroll.com

Connect with Kroll
Business introduction

The sources and nature of risk are ever changing

We help leaders reduce risk, manage compliance, navigate litigation and make confident decisions

We begin this new chapter with a fresh look and a clear and confident vision for the future. United under the Kroll brand, which includes our endorsed Duff & Phelps businesses, we deliver a seamless experience across our full suite of services, with a cohesive approach to bringing tech-forward solutions to the market. Our goal is to produce greater value for our clients and partners along with compelling career opportunities for our people.

Kroll is the world’s premier provider of services and digital products related to governance, risk and transparency. Built on the strength and equity of our legacy brands, we are an independent advisory firm with nearly 5,000 professionals in 30 countries and territories around the world.

Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity—not just answers—in all areas of business.

Kroll Solutions

24x7 Endpoint Detection and Response

Imagine being able to detect and respond swiftly to credible threats on your servers, laptops, and workstations backed by the world leaders in cyber investigations and continuous threat hunting and response solutions. Kroll’s CyberDetectER® Endpoint, in an exclusive partnership with Red Canary, gives you that confidence, relieving the burden and......

business needs
view solution

Business Continuity

Anything that affects your facilities, operations, or people can put your business continuity at risk, from natural disasters like hurricanes that stall shipments of critical components, to infrastructure failures like overtaxed power grids, to civil unrest or labor strikes. Kroll’s expertise and knowledge to assess the effectiveness of your existing business......

business needs
view solution

Computer Forensics

Claims of fraud, financial tampering, computer crime, employee misconduct, and other wrongdoing require corporations, law firms, and government agencies to follow digital trails to piece together facts that lead to the truth. Kroll’s computer forensics experts help ensure no digital evidence is overlooked and assist at any stage of a digital......

business needs
view solution

Crisis Management and Emergency Response

Out of nowhere, a crisis strikes. These events may include natural disasters, business interruptions, criminal or malfeasance perpetrated by individuals, or violent political activity. Do your business leaders and employees know how to react to an active shooter situation, political or social unrest, a medical emergency or a hazmat incident? We......

business needs
view solution

Cyber Policy Review and Design

Ensure corporate policy design is keeping pace with your dynamic risk environment Your organization likely has policies in place aimed at keeping information secure and responding to a data security incident. Such safety measures are required by a number of federal, state, and industry regulations. Yet policies aren’t just a matter......

business needs
view solution

Cyber Risk Assessments

When it comes to data breach prevention, what you don’t know can hurt you. Your company faces IT risk daily – whether you’re fending off internal threats or enhancing protection against external intrusions. How well are you balancing your need to lock down data with tighter security controls, while providing your......

business needs
view solution

Data Protection Officer (DPO) Consultancy Services

Preparing for GDPR compliance Article 37 of the General Data Protection Regulation (GDPR) mandates the appointment of a Data Protection Officer (DPO) for all public authorities and other organisations where the core activities of the controller or the processor involve “regular and systematic monitoring of data subjects on a large scale” or......

business needs
view solution

Data Recovery and Forensic Analysis

Data recovery: extending your window of opportunity When a data breach event occurs, your company only has a short window of time to gather critical evidence. Internal IT resources are often forced to act as a first line of defense — but first responders who are untrained in data recovery and......

business needs
view solution

Executive Protection

Executives face threats that vary widely depending on the industry, size of the company, geopolitical locations, and the individual’s profile. Our aim is to establish and maintain a safe working and living environment for our clients while continually minimizing risk. We achieve this by providing executive protection operatives to support......

business needs
view solution

Identity Monitoring

When compromised, criminals can take advantage of sensitive data like Social Security Numbers and Medical ID Numbers for months, or even years, before suspicious activity appears in credit reports.  Organizations often choose to provide consumers with Kroll's identity monitoring solution to reveal known triggers of identity theft that credit monitoring alone......

business needs
view solution

IDShield Powered by Kroll

IDShield, powered by Kroll, is built on decades of experience in helping people secure their personal information. This powerful service monitors identities from multiple angles – keeping a watchful eye for theft and fraud and alerting you to changes we detect. With IDShield, you receive 24/7 monitoring of the information you......

business needs
view solution

Incident Response Management

Even with the most robust controls in place, a data breach may still occur Kroll has helped countless organizations worldwide respond to data loss — and we can help you. We respond quickly when your confidential information is compromised, no matter the source of the data breach, whether it’s the result......

business needs
view solution

Information Security

When organizations lose information, the cause can be traced to one — or more — of five risk factors: people, paper documents, information technology systems, other electronic devices, such as tablets or memory sticks, and surveillance devices (bugs). Our experts can guide you in the selection and implementation of security controls......

business needs
view solution

Kroll CyberDetectER®

For the first time in 10 years of reporting, information theft, loss, or attack was the most prevalent type of fraud experienced said executives surveyed in Kroll's Global Fraud & Risk Report 2017/2018. There are myriad ways – and places – that your organization’s sensitive or confidential data can be accidentally......

business needs
view solution

Malware and Advanced Persistent Threat Detection

Malicious software attacks that succeed in infiltrating a company’s network pose a strong threat to commercial and public sector interests. At Kroll, we help organizations identify and analyze suspected malware to determine exactly what it was — or was not — capable of doing. Understanding the threat from viruses and spyware No......

business needs
view solution

Penetration Testing Services

Your organization’s data and networks are under siege by cyber criminals. As a security-conscious organization, you continually try to protect against the many threats and vulnerabilities facing your cyber assets. How confident are you that your protective measures are effective against current and emerging cyberattacks? The way cyber professionals recommend to......

business needs
view solution

Private Client and Family Office Services

Kroll provides a variety of security risk management services to family offices and high net worth individuals. Threats to personal security can surface in varied and unexpected ways, including opportunistic street crime, obsessive stalkers, medical emergencies, accidents, fires and natural disasters. Our objective is to recommend a security strategy that provides......

business needs
view solution

Securing Intellectual Property

It is not uncommon today to find that individuals involved in compromising a company’s intellectual property (IP) are a combination of current or former employees, competitors, trusted customers, distributors, or vendors. For this reason, the security equation must encompass issues of management structure, operational security, and cyber security. Protecting your intellectual......

business needs
view solution

Security Audits

Security measures are of little use if they are not enforced. A security audit assesses how effectively your organization’s security policies are being implemented. Our audits will show you where gaps and vulnerabilities might exist in your current systems and procedures. In more than 40 years, we have seen countless reasons......

business needs
view solution

Security Master Plans

Good security risk management begins with a master plan — a vision of the security department, its roles and responsibilities, and how it fits into the overall organization. We have found that security is more effective when you look at your organization as a whole. Accordingly, we address all aspects of......

business needs
view solution

Security Planning

While many consultants view security strictly from the electronic system perspective, our security planning philosophy is grounded in our experience designing comprehensive security programs for clients across a multitude of industries. In our approach, we balance the three basic elements of security: architecture, operations and electronic systems. Under this philosophy, we......

business needs
view solution

Security Policy and Procedure Development

Do you have policies and procedures that cover risks like workplace violence, bomb threats, active shooters or natural disasters? How about executive protection or travel to high-risk areas? How do you know if current procedures will be sufficient or effective? Given the complexity of most organizations, developing effective security programs can......

business needs
view solution

Security System Procurement and Implementation Assistance

Security system procurement and implementation can be overwhelming responsibilities. Kroll understands. Our systems experts and security specialists will ensure that the systems you choose not only meet the functional and technical requirements, but are also installed on time and within budget and represent the best value for you. During system procurement,......

business needs
view solution

Security Training Services

Our trainings can encompass broad points of view to narrow solution-oriented presentations to meet the challenges of specific business units. We work with institutions to understand their needs and what training they need, then customize presentations around the staff, facility and risk. Our work is tailored directly to each client......

business needs
view solution

Third Party Cyber Audits and Reviews

No matter how secure your company’s IT system is, sometimes your risk of data breach depends on who you associate with. In today’s complex business environment, large amounts of sensitive data are often shared with partners, outside vendors and service providers — who all have their own dedicated IT systems,......

business needs
view solution

Threat and Vulnerability Assessments

Comprehensive threat and vulnerability assessments are essential to securing your organization. Our multidisciplinary approach looks at security from every angle to mitigate risks — from the physical environment to the human element to the role of technology. Effective security starts with a clear understanding of your vulnerabilities. We can help you......

business needs
view solution

Threat Management

Corporate and social disaffection is a breeding ground for threatening behavior from individuals aimed at institutions, corporations, or their personnel. This can take many forms — from stalking and harassment to unwanted communications and disruptions. Our staff of former prosecutors, law enforcement officers and security specialists can investigate the source of......

business needs
view solution

Virtual CISO (vCISO) Advisory Services

Irrespective of regulatory scrutiny in your industry or your organization, too much is at stake to not have a CISO on your team. A full-time data security leader has the specialized technical knowledge and corporate governance experience to help build not only a strong cyber security foundation, but also the......

business needs
view solution

Vulnerability Scanning

Knowledge is power Is your company’s IT system vulnerable to attacks by malicious outsiders? Could internal enemies damage your data security? Kroll’s vulnerability scanning services can help you answer these important questions — mapping out a prioritized pathway to increased cyber security for your business. Kroll’s team of licensed experts will run......

business needs
view solution

Subscribe to our newsletters

The Wealth Mosaic publishes a range of newsletters each month to help both wealth managers and solution providers stay on top of the latest developments in the global wealth management sector. Click below to sign up to those that are of interest.

Please sign up to see more

Sign up or login