We consistently provide firms with the professional investigative consulting expertise necessary to resolve conflict through fact-finding and critical analysis.

We have conducted thousands of investigations worldwide and have an unmatched track record of resolving disputes and working with in-house and outside counsel to successfully conduct and conclude internal or regulatory inquiries.

Our experts help organizations with their critical fact finding when they need to conduct internal investigations or to examine allegations of wrongdoing. Whether or not actual misconduct is discovered, such inquiries, and their aftermath, can pose serious risks to companies and their stakeholders, damaging their reputation, disrupting their business operations and exposing them to government scrutiny, as well as to potential criminal, civil and regulatory liability.

In situations where an independent investigative auditor may be required, wel can put its expert financial and investigative teams to work, having served as a court-appointed or agency-appointed monitor in numerous organizations including, finance, banking, construction as well as labor unions.


- Asset Searches
- Brand Protection
- Financial Investigations
- Regulatory Investigations
- Forensic Accounting
- Dispute Advisory Services
- Internal Investigations
- Litigation Support
- Business Intelligence
- Proxy Contests
- Monitorships
- Cyber Crime Investigations
Whether you suspect internal fraud, a data breach, or have assets that need tracing, our multi-disciplinary team of experts can be your partner to investigate business and financial misconduct with speed and discretion, allowing you to make decisions with confidence.
EG and affiliates provides clients with corporate intelligence that allows them to sort fact from fiction.

Our investigators and analysts put hard-to-find facts on the table, enabling them to make informed decisions by providing exceptional analysis of well-researched opportunitie
Due Diligence Capabilities

We provides companies with a comprehensive suite of due diligence and business intelligence solutions so they can better protect their investments and make critical business decisions with confidence.

Whether you are evaluating investments, entering new markets, vetting third parties or satisfying regulatory requirements, we offer a broad spectrum of consultative and scheduled solutions to address your specific needs.

Our risk-based approach allows us to conduct the appropriate level of due diligence based on specific criteria.

Clients can access Company's spectrum of due diligence offerings by working with our investigative professionals through the traditional consultative process or via our on-line customer portal, depending on the level of due diligence required.
Screening & Red Flag
- Programmatic
- Global Standardization
- Multiple Languages
- Technology-Enabled
- High-Volume Compliance Programss
Enhanced Due Diligence
- Programmatic and Consultative Options
- Local Language Research
- Local Source Inquiry Options
- Higher-Risk Compliance
Depth, Breadth, & Comprehensiveness
Investigative Diligence
- Consultative and Iterative
- Investigative Methodology
- Global Coverage
- Customized
We are specialized in identifying, remediating and monitoring risk across your enterprise.

We address each client issue with a unique team tailored to your situation
Consultancy Services

We are an independent, global risk consultant specialized in security and safety risk.

We help the most influential people and organizations in the world to understand and manage the risks and opportunities of operating in complex or hostile environments.

We support clients by providing strategic consultancy, expert analysis and in-depth investigations through to handling sensitive political issues and providing practical on the ground protection and support.

Our unique combination of services together with the trust our clients ensures our ability to help in order we effectively solve problems and realize new opportunities across the world.

- Due Diligence Capabilities
- Cyber security
- Investigations
- Compliance
- Security Master Plans
- Security Risk Analysis & Management
- Resilience Consulting
- Security Design
- Security Consulting
- Security Countermeasure Systems
- Crisis Management

Regardless of the project size and complexity, our aim is to provide a fully integrated end to end solution that is innovative in its approach to emerging threats and technologies. Our services incorporate all aspects from master planning and concept design, to security strategies, a full design capability and implementation support and assurance.

Our intuitive approach ensures that our security consultants are a natural choice to help clients plan, design and enable a safe and secure environment for their business today, tomorrow and into the future.

We work with our clients to establish assurance frameworks that are cost effective, appropriate and scaleable.

Our risk based methodology enables us to establish assurance requirements for technical cyber and information controls, related processes and for the people that operate and manage them

With and through International Armour, a contractor of Kroll, we serve a global clientele through more than 50 offices across nearly 30 countries.

More than 2,000 available professionals are offering a wide range of specialized skills delivering an unrivaled mix of talent and experience in virtually any market.
Security Risk Analysis & Management

Risk Analysis helps establish a good security posture; Risk Management keeps it that way.

Security measures cannot assure 100% protection against all threats. Therefore, risk analysis, which is the process of evaluating system vulnerabilities and the threats facing it, is an essential part of any risk management program.

The analysis process identifies the probable consequences or risks associated with the vulnerabilities and provides the basis for establishing a cost-effective security program.  Risk management is the process of implementing and maintaining countermeasures that reduce the effects of risk to an acceptable level.

We use a holistic approach that addresses all aspects of your security and operational risks for the most robust protection.

Our teams, business and strategic partners includes mechanical, electrical, manufacturing and telecommunications engineers; veterans from various military organizations and law enforcement agencies; and experts in related operational disciplines such as finance, information security, and crisis communications.

Because security risks are interconnected and ever-evolving, count on us for expert advice on the widest range of security services to manage organizational or individual risks. We have global experience with private clients and businesses in virtually every industry and provide a wide range of risk mitigation services, including:

- Audit Management
Policy Management
Risk Management
Compliance Management
Enterprise Management
Incident Management
- Vendor Management
Threat Management
- Business Continuity Management

- Security Policy & Procedure Development
- Security Audits
- Security Master Plans
- Securing Intellectual Property
- Security and Political Risk Consulting
- Security Planning
- Integrated Security System Design & Engineering
- Security System Procurement & Implementation Assistance
Special Security Consulting

We can help you create a robust security environment with services that include threat assessments, policy review and development, and master planning.

Security decisions you make today can determine your organization’s security and resilience for years to come. Our comprehensive security consulting services enable you to feel more confident about the actions you take to protect your family office, employees, operations, facilities, and assets.

We don't blink when you want to be safe and secure! What you “need” to be safe may not be the same as what you “want” to feel safe. 

At ESP we can provide you both "need" and "want". 

Our Company Professionals have spent many hours researching and refining what we believe to be the most important to you.

Our global security consultants have decades of experience advising private clients and corporations across industries that range from construction, manufacturing, and transportation to education, hospitality, and government.

To be always in readiness against any request, we have divided our Company in various business and services sectors:

- Threat and Vulnerability Assessments
- Security Policy and Procedure Development
- Security Audits
- Security Master Plans
- Securing Intellectual Property
- Security and Political Risk Consulting
Conflict Sensitive Threat Assessment
Solution design
and evaluation
& improvement
& QC
Security Design

Feel confident that your new construction and facility upgrades are secure. Our team's design and security system expertise have assisted diverse projects for clients and developers worldwide.

Our certified security consultants and engineers design and oversee cutting edge security systems that help all stake holders - including tenants, corporate security officers, and executives - feel more confident in the strategies deployed.

We are proud to have been chosen to contribute our expertise to some of the largest and most ambitious construction projects around the world.

We are working closely with top security experts, consultants and leading technology companies and we provide the most efficient, cost-effective and practical solutions according to the demands of each client.

Our personnel proven experience includes security and defense missions in more than 40 countries worldwide:

• Physical security and personal protection services
• Consulting to private militaries and security companies
• Training and consulting to security personnel
• Implementing security layouts according to security risk assessments
• surveillance teams
• Preparing and implementing penetration tests
• Providing tactical medical consulting / Instruction
Design and implementation of the right security you need in order to real be safe and only feel safe!
Fully qualified armed and unarmed security teams to protect you business, your property and your life.
Security design and security Services and master plans for   Companies, organizations and  governmental entities.
We help you manage threats of this kind in a systematic, controlled, confidential and secure way!
With and through our strategic partners and affiliated companies, we provide security services; Physical security, Executive protection, Diplomatic & VIP protection, Land security, Maritime security, Emergency response and response analysis, Security audits, Counter surveillance, Threat-Risk assessment and security contingency planning, Special task teams, Trusted intelligence solutions, Private investigations and Plants/mines security.
Resilience Consulting

We provide end to end crisis management and business continuity services from assessments and plan designs, to rehearsed drills and emergency security services in the field and the sea

Our experts help organizations, families and individuals with planning, designing interventions and support for various issues.

With organizations we work on enhancing resilience through developing, auditing and validating crisis and emergency preparedness planning.

We design table-top simulation exercises that provide both experiential feedback and plan validation to members of the crisis / emergency response teams.

Our analysis and recommendations are designed to specifically support your organizational requirements.

The common language of Resilience Consulting:

Risk Assessment (RA) - The RA is an overall process of risk identification, analysis, and evaluation of the threats and vulnerabilities

Business Impact Analysis (BIA) - The BIA is a process designed to identify critical business functions and their dependencies, and to prioritize and establish recovery time objectives

Disaster Recovery (DR) - A foundational element of an enterprise business continuity plan, addressing recovery of technology

Business Continuity Planning - Integrates DR and BCP, and also identifies the mission-critical business processes that must survive through a significant disruption or disaster for your Company to remain solvent. The BCP addresses survivability issues

Crisis Management (CM) - The overall coordination of an organization’s response to a crisis, in an effective, timely manner, with the goal of avoiding or minimizing damage to the organization’s profitability, reputation, and ability to operate

Emergency Preparedness (EP) - The capability that enables an organization or community to respond to an emergency in a coordinated, timely, and effective manner to prevent the loss of life and minimize employee or customer injury and property damage
Security decisions you make today can determine your organization’s security for years to come.
Our security consultants can ensure you take a considered approach that is based on industry best practices as well as real-world experience.
We examine all threat risks and develops a baseline level of protective security that accomplish your real needs!
Boost your cyber security - Protect your bottom line

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life!

We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really import.

In today’s information economy, data can be your organization’s most valuable asset, but with the rise of mobile technology, cloud computing and an exponentially growing volume of digital information, keeping that data secure also becomes one of your greatest challenges.

At ESP we know securing and managing electronically stored information (ESI) is critical to the future of your business. For this we offer end-to-end cyber security consulting, from information risk assessments that help you benchmark safety measures and shore up weaknesses, to penetration testing that checks for robust defenses.

Our global teams/partners deliver scalable cyber security solutions to help you protect confidential and proprietary information from data security risks such as malicious insiders, network vulnerabilities and inadequate security policies.

Cyber Security Capabilities

- Cyber Risk Assessments
- Cyber Policy Review and Design
- Penetration Testing
- Vulnerability Scanning
- Third Party Cyber Audits and Reviews
- Identity Theft Resolution
- Credit Monitoring
- Identity Theft and Non-Credit Monitoring
- Identity Fraud Protection and Consultation
- Identity Theft Restoration
- Data Collection and Preservation
- Data Recovery and Forensic Analysis
Level 1
Level 2
Level 3
Level 4
Security Master Plan

Produce a plan that enables you to prioritize, estimate and implement risk mitigation measures that can be adapted if your needs change.

Good security risk management begins with a master plan - a vision of the security department, its roles and responsibilities, and how it fits into the overall organization. We have found that security is more effective when you look at your organization as a whole.

Accordingly, we address all aspects of security planning simultaneously to provide our clients with a security master plan that serves as a coordinated and cohesive security solution.

While built on best practices, our master security plans are customized for your unique needs. In our experience, the most effective plans will incorporate responsibilities not only for preventing, detecting, investigating, and responding to incidents, but also for ongoing monitoring and updating of the plan itself.
The goal of a master plan is the effective and evolving security risk management

Our approach to creating a security master plan starts with an assessment of the current risk environment. We will identify any high-risk areas in your organization based on the severity of impact and likelihood it will occur.

This process can include both interviewing a variety of personnel as well as examining technical resources such as electronic security systems.

Our goal is to ultimately produce a plan that will enable you to prioritize, estimate the cost, and implement risk mitigation measures that can be adapted if your needs change.

The four major components for developing a security master plan typically include:

- Asset Definition to establish priorities for the security master plan. It is not realistic to assume that every asset can be or should be protected against every possible threat. Assets will be identified on how critical each is to the organization.

- Threat Assessment that includes the identification and analysis of potential threats against your organization. Events are typically categorized as criminal, natural, or accidental.

- Vulnerability Analysis
where we correlate assets and threats and define the method or methods for compromise. We will analyze the existing security program to identify any physical, operational, and procedural weaknesses that may exist and identify potential countermeasures that could be implemented to minimize the probability of an event.
The primary goal of this analysis is to develop a profile that defines overall threats that may affect your organization. A profile is developed that would categorize threats as highly probable, possible, or unlikely.

- Security Measures
are selected for implementation. The selection process is intended to channel resources to protect the most vital assets against the most probable threats. Security measures for a comprehensive security master plan typically addresses the following:

- Architectural elements
- Operational elements
- Electronic security systems
- Policies and procedures (guidelines)
Prevent, Respond, Remediate

Kroll is the leading global provider of risk solutions.

Company helps clients to make confident risk management decisions about people, assets, operations and security for more than 40 years.

Kroll is specialized in identifying, remediating and monitoring risk across your enterprise.

Kroll address each client issue with a unique team tailored to your situation.

Kroll serves a global clientele through more than 50 offices across nearly 30 countries.

Individually, Company's 2,000 professionals offer a wide range of specialized skills, while together delivers an unrivaled mix of talent and experience in virtually any market.

International Armour is official contractor of Kroll in all levels related to;

- Investigations
- Due Diligence
- Compliance
- Cyber Security
- Data Breach Response
- Security Risk Management
- Data Recovery
- Ediscovery

From investigations to cyber security, we find answers to your most
critical questions every step of the way.
Kroll is founded with the ground-breaking mission of helping clients improve operations by uncovering kickbacks, fraud or other forms of corruption.
Copyright 2016, Equator Group - All rights reserved