+27 (31) 822 7979 info@sheepdogsecurity.co.za


Criminal Investigations

The goal of a criminal investigator is to identify the perpetrators of crimes, their motivations, and identities. They may also look for and question witnesses. The end goal of a criminal investigation is to establish guilt “beyond a reasonable doubt” for the judge, magistrate, or presiding officer.

The objectives of criminal investigations are:

  • Detect crime
  • Locate and identify suspects in crimes
  • Locate, document, and preserve evidence in crimes
  • Arrest suspects in crimes
  • Recover stolen property
  • Prepare sound criminal cases for prosecution

Industrial Investigations

This is the investigation of incidents that have occurred in the workplace.

The following are some instances of situations for which industrial investigations may be conducted:

  • Loss of business property can trigger an investigation into the theft
  • Destruction to corporate property that could result in a civil claim for negligence or criminal prosecution of malicious damage to property
  • Accident
  • Unrest
  • System breakdown
  • Problems with health and safety

Commercial Investigations

There are occasions when it’s necessary to conduct commercial investigations on your staff. It doesn’t matter if you trust them or not; the important thing is to protect your business from any actions that can undermine its performance. Our experts will give you the knowledge you need and can assist you in doing this ethically.

Types of commercial investigations include:

  • Competitor activity
  • Internal issues
  • Sick leave and absenteeism

Domestic Investigations

Investigations focused on people and their legal issues are generally referred to as domestic investigations. These issues might involve fraud, theft, or abuse that takes place in a person’s own home.

Your domestic investigator may utilise one of the following forms of investigation, depending on the circumstances of your case:

  • Domestic surveillance
  • Background checks
  • Undercover or covert operations
  • Computer forensics
  • Public record and information research
  • Locate people

Managed Security Solutions

Managed Security Solutions should offer a complete outsourced security solution for an enterprise. An organisation’s enterprise networks and endpoints are the focus of the security monitoring and incident response services.

Common services include:

  • Managed Firewalls
  • Intrusion Detection
  • Virtual Private Network
  • Vulnerability
  • Anti-Viral Services
  • Off-Site CCTV Monitoring
  • Off-Site VNPR (Vehicle Numberplate recognition Monitoring and Intervention
  • Off-Site Facial Recognition Monitoring and Intervention
Forensic Investigations

Forensic Investigations

Forensic investigation aims to identify a suspect by compiling and examining all physical evidence related to crimes. For example, investigators will examine blood, fluid, fingerprints, residue, hard drives, computers, or other technologies to determine how a crime occurred.

Types of forensic investigation:

  • Forensic Accounting/Auditing
  • Computer or Cyber Forensics
  • Crime Scene Forensics
  • Forensic Archaeology
  • Forensic Dentistry
  • Forensic Entomology
  • Forensic Graphology
  • Forensic Pathology
  • Forensic Psychology
  • Forensic Science
  • Forensic Toxicology

Guarding Services

Each guard receives extensive training in accordance with legal regulations, enabling them to meet our clients’ extraordinary security needs. We customise our services to meet the unique demands of each of our clients. We can guarantee every customer obtains the best security solution, thanks to our versatility. We put a lot of money into training and management assistance for our security officers because they are on the front lines and represent both us and our clients.

Security guard services provided:

  • Entrance and exit screening
  • Personal and property security
  • Emergency rescue and emergency management services
  • Security patrols
  • System monitoring

Undercover Agents

An inexpensive and effective way to find problems typically hidden from management is to infiltrate them with an undercover agent. According to statistics, most workplace crimes are conducted with the knowledge of other employees. These employees may not necessarily support the behaviour, but they choose not to report it out of fear of intimidation and retaliation.

What an undercover agent does:

  • Adopt a false identity
  • Perform electronic surveillance
  • Identify dishonest employees
  • Search for missing persons
  • Detect fraud
  • Infiltrate organised crime
Risk Management

Risk Management

Identification, assessment, and control of financial, legal, strategic, and security threats to the assets and profits of an organisation constitute the process of risk management. These dangers or risks could be caused by a wide range of things, such as monetary instability, legal liabilities, poor strategic management, mishaps, and natural disasters.

The basic methods for risk management include:

  • Avoidance
  • Retention
  • Sharing
  • Transferring
  • Loss Prevention and Reduction
Vehicle Number Plate Recognition

Vehicle Number Plate Recognition

The image-processing technology LPR (License Plate Recognition), commonly referred to as ANPR (Automatic Number-Plate Recognition), is used to recognise cars by their license plates.

The device takes an image of the front or back of the car using illumination and an infrared camera. It then utilises image analysis software to extract the license plate information. This information is processed against the police data and other databases to which rapid intervention by the police and security companies is carried out.

Vehicle number plate recognition helps to:

  • Keep a watchful eye on community policing
  • Collect, control, and track data
  • Track and trace criminals through number plates
  • Monitoring of clients for VIP Protection 
Armed Escorts

Armed Escorts

Our skilled security professionals offer armed escort services for clients who need to transport precious and delicate merchandise inside South Africa.

We take pride in that our employees are only hired after passing our own rigorous screening requirements, which place a special emphasis on experience, skills, aptitude, attitude, and, most crucially, security clearance.

The service of armed escorts includes:

  • Tracking and Identifying Current Risk
  • Identifying New Risk
  • Evaluate Risk Processes
  • Execute Risk Mitigation Actions

Managed Security Solutions

Managed Security Solutions should offer a complete outsourced security solution for an enterprise. An organisation’s enterprise networks and endpoints are the focus of the security monitoring and incident response services.

Common services include:

  • Managed firewalls
  • Intrusion detection
  • Virtual private network
  • Vulnerability
  • Anti-viral services
Forensic Auditing

Forensic Auditing

The scope of forensic audits includes many different types of research. For example, a forensic audit is frequently performed when a party is investigated for fraud, embezzlement, or other financial crimes. In addition, the auditor may be called as an expert witness in a forensic audit procedure during court proceedings.

Services provided by the forensic auditor:

  • Constructing the inquiries to be asked
  • Providing answers to inquiries
  • Choosing the papers that will be demanded and/or subpoenaed
  • Finding those with the greatest knowledge of information
  • Carrying out research that is pertinent to the case’s facts
  • Locating and protecting important evidence
  • Assessing the completeness of the information and documentation produced
  • Examining created records and other data to look for facts
  • Figuring out alternate ways to get important data and information
  • Supplying deposition questions for cross-examining facts and expert witnesses


A polygraph is a device or process that measures and records several physiological indicators while a person is asked and responds to a series of questions. These indicators include blood pressure, pulse, respiration, and skin conductivity. Although there are no specific physiological reactions linked to lying, it can be challenging to identify factors that distinguish those who are lying from those who are telling the truth. This is due to the misconception that deceptive answers will result in physiological responses that can be distinguished from those associated with non-deceptive answers, which is the basis for using the polygraph.

The most common polygraph uses are:

  • Sexual Harassment Accusations
  • Sexual Abuse Accusations
  • Rape Allegations
  • False Accusations
  • Criminal Behaviour Accusations
  • Domestic Violence Complaints
  • Criminal Negligence Accusations
  • Statement Verification (Proof of truth)
  • Witness Statement Verification
Armed Escorts

Bodyguarding & Close Protection Services

Close Protection Services entail giving anyone who needs it executive protection. Celebrities, politicians, nobles, and corporate leaders may request VIP security protection, but it may also be requested by persons who have received threats. In essence, VIP security covers the safety of the full person, including, frequently, their family members and valuables.

Sheepdog has scoured the operatives available and shortlisted some of the most efficient and dedicated personnel and utilises such personnel in their everyday operations. Each CPO has been thoroughly vetted by Sheepdog, their levels of training, their past Principals, their interaction with those Principals, personality traits, and dedication to duty.

The senior members of the Sheepdog Personal Protection team have been utilised over the years to protect some very high-profile dignitaries and political personalities, such as:

  • Oprah Winfrey – television host
  • Bill Clinton – ex-American President
  • Bill Gates – owner of Microsoft
  • Carlos Santana – rock musician
  • Samuel L Jackson – movie star
  • Princess Charlene of Monaco


CCTV (closed-circuit television) is a type of TV system used primarily for security and surveillance, in which signals are monitored but not broadcast to the public.

CCTV relies on strategically placed cameras and viewing camera input on remote displays. Closed-circuit refers to the private coaxial cable lines or wireless communication links that the cameras use to link to monitors and/or video recorders, indicating that access to their material is meant to be limited to those who can see it.

Here are some benefits of CCTV:

  • Peace of mind
  • Deterrent and crime prevention
  • Prosecution
  • Remote monitoring
  • Ideal in conjunction with intruder alarms
  • Reduced insurance premium
  • Low price, high quality
Facial Recognition

Facial Recognition

By employing software to compare two face photos, facial recognition can be used to assess the validity of a claim. The technique can be used to sign a user into their phone or look up a certain individual in a database of images, among other things.

The technology is used for a variety of purposes. These include:

  • Unlocking Phones
  • Law Enforcement
  • Airports and Border Control
  • Finding Missing Persons
  • Reducing Retail Crime
  • Improving Retail Experiences
  • Banking
  • Marketing and Advertising
  • Healthcare
  • Tracking Student or Worker Attendance
  • Recognising Drivers
  • Monitoring Gambling Addictions
Crime Prevention Units

Crime Prevention Units

The goal of crime prevention teams is to develop risk management strategies that combine traditional areas of expertise with a significant amount of intelligence gathering and to have these strategies implemented by committed and conscientious experts in order to provide a service that is results-oriented.

Some principles of crime prevention are:

  • Making your property harder for an offender to access
  • Ensuring that a potential target is out of view
  • Removing items that may help commit an offence
  • Reducing the profit the criminal can make from the offence
  • Looking at measures that will control access
  • Improving surveillance
  • Deterring an offender or deflecting their intention

Vehicle Tracking

A vehicle tracking system, often known as a car tracking system, combines your vehicle’s GPS tracking system with software that gathers fleet data. As a result, your vehicle can be located using this fleet data. Using a GPS tracker is a crucial component of most stolen car recovery techniques; however, some vehicle tracking systems do not employ GPS technology and instead rely on cellular or radio transmitters.

Benefits of vehicle tracking include:

  • Improved Safety
  • Minimise Fuel Costs
  • Lower Operational Costs
  • Increased Productivity
  • Theft Recovery
vehicle fleet management

Vehicle Fleet Management

The complicated duties involved in vehicle fleet management ensure that a company’s transportation fleet remains profitable. When a fleet is managed correctly, operating costs are lowered, drivers are safe, and consumers are satisfied. Tasks involving fleet management necessitate a strong administrative and analytical foundation as well as in-depth car industry expertise.

Benefits include:

  • Reduced Fleet Fuel Costs
  • Improved Customer Service
  • Eliminating Theft and Waste
  • Reduced Fleet Labour Costs
  • Reduced Maintenance Costs
  • Savings from Fleet Tracking
Tracing services

Tracing Services

When someone leaves their last known residence, and their present locations are unknown, a tracing service is employed to find them. To find the missing person’s current address, our knowledgeable tracing agents employ a variety of tools and techniques. Investigations into missing people, long-lost relatives and acquaintances, witnesses, and debt recovery are the areas of specialisation for tracing agents.

Here are some examples of what kinds of people we trace:

  • Missing Persons
  • Runaways
  • Debtors
  • Defaulters
  • Witnesses
  • Wanted Persons
  • Persons of Interest
  • Fugitives
  • Heirs
  • Childhood Friends
Background Checks, Verifications & Screening Services

Background Checks, Verifications & Screening Services

The practice of checking and validating numerous pieces of private and secret information on a person or organisation is known as background screening (also known as background checks).

This data is used to check whether a person or organisation is being truthful and open about their qualifications. Based on concrete information that is already accessible, such checks are also employed as a proactive step in identifying and lowering or managing prospective recruiting and procurement risks.

Background/ Verification/ Credit and Risk checks on businesses can include:

  • Company Checks
  • Deed Search
  • Directorship Checks
  • B-BBEE Certificate Verification
  • SARS Verification
  • Credit Checks
  • Risk Analysis
  • CPIC Verification
  • Certification Checks
  • Membership Checks

Background/ Verification Checks on Individuals can include:

  • Qualification Verification
  • Criminal Record Checks
  • Credit Checks
  • Previous Employment History and Reference Checks
  • Identity Verification
  • Fraud Verification
  • Firearm Licence and Ownership Checks
  • eNatis Checks and Verification
  • Deed Search
  • CIPC Verification
Sheepdog Logo
Sheepdog Logo
Sheepdog Logo

Compliance & Accreditations