
Three phases. One outcome.
From the first threat assessment to the final compliance audit, every Critec engagement follows the same disciplined arc.
Phase 01 of 03
Define.
Understand the threat. Frame the strategy.
Collaborative analysis that turns ambiguity into a written, defensible security strategy — built around your operations, your assets, your risk appetite.

- Security Threat, Risk & Vulnerability Analysis
- Feasibility studies & concept designs
- Concept of Operations (CONOPS)
- Front End Engineering Design (FEED)
- Operational Requirements documentation
- BRE SABRE Assessments & Professional Services
- Drone-led mapping and modelling
Phase 02 of 03
Design.
Engineer the response. Integrate the layers.
Where strategy becomes a buildable, accreditable design — physical, electronic, procedural — engineered to current threats and validated against the next.

- Physical & electronic security engineering
- Blast analysis & protective design
- Hostile Vehicle Mitigation analysis & solutions
- Design validation
- Command & Control Centre Design
- Project specification documentation
- Design modelling & visualisation
Phase 03 of 03
Deliver.
Move it from drawing to operational reality.
Independent client-side execution that protects programme, cost, and quality — from tender support and contractor assessment through compliance audits.

- Pre & post-tender support
- Tender evaluation and management
- Contractor assessment
- Client representation
- Project Management Office (PMO)
- Package & programme management
- Security procedure assessment & development
- Compliance Audits
Capability matrix
Every deliverable, mapped to the phase it belongs in.
01 · Define
- Security Threat, Risk & Vulnerability Analysis
- Feasibility studies & concept designs
- Concept of Operations (CONOPS)
- Front End Engineering Design (FEED)
- Operational Requirements documentation
- BRE SABRE Assessments & Professional Services
- Drone-led mapping and modelling
02 · Design
- Physical & electronic security engineering
- Blast analysis & protective design
- Hostile Vehicle Mitigation analysis & solutions
- Design validation
- Command & Control Centre Design
- Project specification documentation
- Design modelling & visualisation
03 · Deliver
- Pre & post-tender support
- Tender evaluation and management
- Contractor assessment
- Client representation
- Project Management Office (PMO)
- Package & programme management
- Security procedure assessment & development
- Compliance Audits
A disciplined, gated process — from kickoff to handover.
- 01
Discover
Stakeholder interviews, site walks, asset register, threat library.
- 02
Analyse
Risk, vulnerability and resilience modelling, gap analysis, SABRE alignment.
- 03
Design
Concept → developed → technical, with validation gates at each step.
- 04
Procure
Tender support, supplier evaluation, contract close-out.
- 05
Commission
Witnessed installation, training, handover, post-occupancy audit.