undercover investigations

Corporate Investigations & Intelligence

  • Undercover Agents
  • Corporate Investigations & Intelligence
  • Read more about our services
surveilance and security

Security Services

  • CCTV System Management
  • Physical Security Audits & Solutions
  • Independent Security Management
  • Read more about our security services

Social Media/Cybercrime Investigations

SSC is proud to announce the introduction of our Social Media/Cybercrime Investigations service. Read more

SSC-Legacy-sml

SSC Legacy

Established in 1962 – SSC Legacy Group of Companies is South Africa’s oldest privately owned and managed Security, Corporate Investigations and training Consultancy. SSC’s highly experienced internal staff and wide network of established expert professional associates, industry contacts and contributors, offers professionally delivered, bespoke Business Intelligence/Investigations/Training and Security Solutions to clients in all sectors of the emerging markets on the continent of Africa and globally.

visit website

SSC-Training-Logo-NEW

SSC Training

Security Service Consultants has been synonymous with trusted and reliable corporate investigation since 1962. We provide international expertise in all forms of corporate investigations both on the continent of Africa and globally. As an industry leader we provide end-to-end investigation solutions confidentiality.

SSC’s experienced staff and established network of legal & financial professional associates, industry contacts and contributors, offers professionally delivered, bespoke Business Intelligence & Security Solutions to our clients.

visit website

Meerkat-Data-Management

Meerkat

Meerkat, was developed specifically for the security practitioner. This platform enables the rapid development of a variety of unique bespoke security solutions such as investigations diaries, CCTV control room management and access control. Meerkat enables the creation of a personalized INTEGRATED KNOWLEDGE PLATFORM (IKP). The analytical data processing enables the client to identify and select key security features embedded in the information that can be used to mount effective and focused operations.

visit website