Services

Three phases. One outcome.

From the first threat assessment to the final compliance audit, every Critec engagement follows the same disciplined arc.

Phase 01 of 03

Define.

Understand the threat. Frame the strategy.

Collaborative analysis that turns ambiguity into a written, defensible security strategy — built around your operations, your assets, your risk appetite.

  • Security Threat, Risk & Vulnerability Analysis
  • Feasibility studies & concept designs
  • Concept of Operations (CONOPS)
  • Front End Engineering Design (FEED)
  • Operational Requirements documentation
  • BRE SABRE Assessments & Professional Services
  • Drone-led mapping and modelling

Phase 02 of 03

Design.

Engineer the response. Integrate the layers.

Where strategy becomes a buildable, accreditable design — physical, electronic, procedural — engineered to current threats and validated against the next.

  • Physical & electronic security engineering
  • Blast analysis & protective design
  • Hostile Vehicle Mitigation analysis & solutions
  • Design validation
  • Command & Control Centre Design
  • Project specification documentation
  • Design modelling & visualisation

Phase 03 of 03

Deliver.

Move it from drawing to operational reality.

Independent client-side execution that protects programme, cost, and quality — from tender support and contractor assessment through compliance audits.

  • Pre & post-tender support
  • Tender evaluation and management
  • Contractor assessment
  • Client representation
  • Project Management Office (PMO)
  • Package & programme management
  • Security procedure assessment & development
  • Compliance Audits

Capability matrix

Every deliverable, mapped to the phase it belongs in.

01 · Define

  • Security Threat, Risk & Vulnerability Analysis
  • Feasibility studies & concept designs
  • Concept of Operations (CONOPS)
  • Front End Engineering Design (FEED)
  • Operational Requirements documentation
  • BRE SABRE Assessments & Professional Services
  • Drone-led mapping and modelling

02 · Design

  • Physical & electronic security engineering
  • Blast analysis & protective design
  • Hostile Vehicle Mitigation analysis & solutions
  • Design validation
  • Command & Control Centre Design
  • Project specification documentation
  • Design modelling & visualisation

03 · Deliver

  • Pre & post-tender support
  • Tender evaluation and management
  • Contractor assessment
  • Client representation
  • Project Management Office (PMO)
  • Package & programme management
  • Security procedure assessment & development
  • Compliance Audits
How we run a project

A disciplined, gated process — from kickoff to handover.

  1. 01

    Discover

    Stakeholder interviews, site walks, asset register, threat library.

  2. 02

    Analyse

    Risk, vulnerability and resilience modelling, gap analysis, SABRE alignment.

  3. 03

    Design

    Concept → developed → technical, with validation gates at each step.

  4. 04

    Procure

    Tender support, supplier evaluation, contract close-out.

  5. 05

    Commission

    Witnessed installation, training, handover, post-occupancy audit.

Begin your project

Telluswhatyou'retryingtoprotect.