What We Do
Our Services
A comprehensive range of investigation, protection, and security services — tailored to your needs.
Ferlio offers a comprehensive range of services to help businesses protect their assets and interests. Our investigations team specialises in uncovering the facts and providing actionable intelligence. We also offer surveillance services to help you monitor and gather information, which can be particularly useful in cases of suspected fraud or embezzlement. For clients who are at a higher risk, we have Close Protection and Undercover Agents services to ensure their personal safety. Our Technical Surveillance & Counter Measures will help to detect and prevent against unauthorised electronic surveillance. Additionally, our profiling team can provide psychological and criminal profiling that may be useful for criminal cases. To assist legal teams, we provide Legal Watch & Brief and Transcripts / Translations services. Our Security Vulnerability Assessment service can help you identify potential vulnerabilities and provide recommendations for improving your overall security posture. With our wide range of services, Ferlio can provide solutions that are tailored to meet the specific needs of your business.
Investigations
Criminal, civil, forensic, fraud, specialist, accident, insurance, medical and more — we uncover the facts and deliver actionable intelligence.
- Criminal investigations
- Investigations in civil matters
- Forensic investigations
- Fraud and internet scams
- Forensic accounting
- Specialist fire investigations
- Accident investigations
- Insurance fraud investigations
- Medical / incapacity insurance fraud
- Restraint of trade investigations
- Employee misconduct investigation
- Test purchasing for brand protection
- Mystery shopping
- Truth verification / Polygraph testing
- Cyber investigations — hard drive imagery, keyword searching, cellphone data recovery, presentation of evidence
- Asset protection
- Asset tracking
- Witness location
- Custody investigations
- Handwriting analysis
- Covert tracking devices
- Truck inspections of sub-contracted companies
Surveillance
Physical, static, electronic, covert and counter surveillance — monitoring and gathering intelligence where it matters most.
- Physical surveillance
- Static surveillance
- Electronic surveillance
- Counter surveillance
- Covert escorting of VIPs
Close Protection
Executive protection, executive support and asset in transit protection — keeping high-risk individuals and assets safe.
- Executive protection
- Executive support
- Asset in transit protection
Undercover Agents
Standard, high-level and strategic agents deployed to infiltrate and gather intelligence across operational environments.
- Standard level agents — tactical level, warehousing, logistics
- High level agents — strategic issues, fraud, theft, corruption
- Strategic level agents — executive information, industry-wide intelligence
Technical Surveillance & Counter Measures
Covert cameras, audio devices, TSCM, data analysis, cyber forensics and cellphone tracking — detecting and preventing unauthorised electronic surveillance.
- Covert cameras
- Covert audio devices
- TSCM — Technical Surveillance Counter Measures
- Data analysis through software (IBase & Analyst Notebook)
- Computer / iPad / cellphone data analysis
- Cellphone location tracking
- Cellphone usage history
Profiling
Lifestyle audits, business profiling, fingerprint screening, financial audits and comprehensive background checks.
- Profiling / Lifestyle audit — Hartman Personality Profiling colour coding system
- Business profiling
- Strategic audits on business
- Fingerprint screening (AFIS / AFISwitch)
- Financial audit investigations
- Employee background screening — ID, driver's licence, criminal record, education, employment, credit, integrity testing, photos, fingerprint verification
Legal Watch & Brief
We draw up a summary with a synopsis of the facts of a legal case for the benefit of the party conducting the case in court.
- Conducted with an ex-Commercial Crime Prosecutor
- Team of advocates for legal opinion
- Interaction with the Department of Justice, SAPS, Special Investigations Unit, and Asset Forfeiture Unit
Transcripts / Translations
Transcribing audio and visual material, and translating African languages to Afrikaans or English.
- Audio / visual transcription
- African languages to Afrikaans or English
Security Vulnerability Assessment
We conduct security vulnerability assessments to identify, quantify and prioritise vulnerabilities in your systems, using a structured five-phase process.
- Phase 1 — Defining specific aspects of vulnerability
- Phase 2 — Measuring the extent of vulnerability
- Phase 3 — Analysing the nature and gravity
- Phase 4 — Improving vulnerability resistance capacity
- Phase 5 — Controlling vulnerability levels
Why Our Services
Expertise & Experience
Over 30 years in the investigation and security industry, with a diversified team carrying 83+ combined years of experience across a wide range of cases and industries.
High-Quality Results
Quick and accurate turnaround on every investigation. Our team is highly trained in evidence analysis to determine cause and identify responsible parties with precision.
Comprehensive Range
A one-stop solution covering investigations, surveillance, protection, profiling, legal support, and security assessments — all under one roof.
Professionalism & Attention to Detail
Every case is handled with meticulous care. Our team is professional, knowledgeable, and always goes above and beyond to ensure your needs are met.
Timely Service
We understand that effective investigations require prompt response and swift action. You receive results as soon as possible without compromising quality.
Confidentiality
We are committed to keeping all client information private. Your trust is paramount, and we maintain strict confidentiality on every engagement.
Not Sure If You Need an Investigator?
Contact us for a confidential consultation. We'll help you understand your options and recommend the right service for your situation.
Get In Touch