Services
We’ll watch your six.
As the go-to security partner for Bakersfield’s leading businesses, from agriculture and automotive to education, energy, and commercial real estate, B.L. Solutions understands your unique security needs. And our solutions are ready for deployment.

Personal Protection
Elite Security for Individuals and Events
Our highly trained security specialists provide discreet, professional protection for high-profile individuals, executives, and public figures. With expertise in threat assessment, defensive tactics, and emergency response, we ensure the safety and peace of mind of our clients in various settings, from private meetings to large-scale events, using state-of-the-art equipment and proven strategies.
Bodyguards
Our proven personal protection specialists complete over 238 hours of specialized training – from discreet evasive driving maneuvers and emergency contingency response to fostering trusted relationships with clients through vigilance. Executive bodyguard candidates also pass stringent pre-employment testing on critical skills like intelligence assessment aptitude, dynamic communication, and precision marksmanship.
EXECUTIVE PROTECTION
Elite Asset Safeguarding
We build customized security protocols upon meticulous planning, access control and fluid communication between protection elements like surveillance units, ground transportation and building entry management. Executive protection engagements also involve in-depth principal travel, medical/nutrition and risk habit analysis for contextual strategy insights that go beyond reactive measures alone.
Event Security
Venue & Gathering Protection
Our custom event security evaluates venue specifics like attendee capacity, entry/exit layout and existing infrastructure to craft tailored operational plans, staffing models and contingency procedures. On-site, mobile units actively monitor and rapidly respond to incidents while layered perimeter elements like surveillance drones and sensory barriers ensure full grounds visibility and early warning detection.
Alarm Systems
Intrusion Detection & Analysis
We survey facilities to install networked sensor systems covering key control points and vulnerable areas both indoors and on entire premises. Alarm detection integrates real-time video confirmation of disturbances to eliminate false positives. Monitored around-the-clock, intelligent analysis also identifies behavioral patterns to refine system actions and alerts security personnel for swift response mobilization.
SURVEILLANCE CAMERAS
Property Observation & Event Documentation
We build customized security protocols upon meticulous planning, access control and fluid communication between protection elements like surveillance units, ground transportation and building entry management. Executive protection engagements also involve in-depth principal travel, medical/nutrition and risk habit analysis for contextual strategy insights that go beyond reactive measures alone.
Access Control
Centralized Security Management
Verkada’s Access Control solution offers a comprehensive, user-friendly platform for managing building security. The powerful, wall-mounted AC52 controller serves as the command center, supporting up to 16 doors for scalable access management. Administrators can easily configure door settings, monitor access events, and manage user credentials from a single, intuitive interface. Seamlessly integrated with Verkada’s Command platform, Access Control delivers centralized management and unparalleled visibility across your entire security system, ensuring a safe and secure environment.
Card/Phone Scanner
Flexible and Convenient Access
Verkada’s AD32 Door Reader simplifies access control by supporting various credential types, including smartphones, key cards, and fobs. With Bluetooth and NFC capabilities, users can unlock doors with a simple tap of their smartphone using the Verkada Pass app. The AD32 also features a built-in camera for enhanced security and visual verification. This sleek and durable reader seamlessly integrates with Verkada’s Access Control system, streamlining credential management and access provisioning for a frictionless user experience.
Video Intercom
Secure, Remote Access Control
Verkada’s Intercom solution combines the power of access control with live video and two-way audio communication. Installed at entry points, the Intercom device allows visitors to request access using the built-in camera, microphone, and speaker. Employees can see and speak with visitors remotely, ensuring secure and controlled access. With instant video verification and the ability to unlock doors from anywhere, Verkada Intercom enhances security and convenience. Fully integrated with Verkada’s Command platform, Intercom provides a comprehensive solution for managing and monitoring building access.
Visitor Management
Streamlined and Secure Guest Experience

SECURITY HARDWARE
Discreet Personal Security Detail
Our proven personal protection specialists complete over 238 hours of specialized training – from discreet evasive driving maneuvers and emergency contingency response to fostering trusted relationships with clients through vigilance. Executive bodyguard candidates also pass stringent pre-employment testing on critical skills like intelligence assessment aptitude, dynamic communication, and precision marksmanship.

SECURITY HARDWARE
Discreet Personal Security Detail
Our proven personal protection specialists complete over 238 hours of specialized training – from discreet evasive driving maneuvers and emergency contingency response to fostering trusted relationships with clients through vigilance. Executive bodyguard candidates also pass stringent pre-employment testing on critical skills like intelligence assessment aptitude, dynamic communication, and precision marksmanship.
Alarm Systems
Intrusion Detection & Analysis
We survey facilities to install networked sensor systems covering key control points and vulnerable areas both indoors and on entire premises. Alarm detection integrates real-time video confirmation of disturbances to eliminate false positives. Monitored around-the-clock, intelligent analysis also identifies behavioral patterns to refine system actions and alerts security personnel for swift response mobilization.
SURVEILLANCE CAMERAS
Property Observation & Event Documentation
We build customized security protocols upon meticulous planning, access control and fluid communication between protection elements like surveillance units, ground transportation and building entry management. Executive protection engagements also involve in-depth principal travel, medical/nutrition and risk habit analysis for contextual strategy insights that go beyond reactive measures alone.
Access Control
Centralized Security Management
Verkada’s Access Control solution offers a comprehensive, user-friendly platform for managing building security. The powerful, wall-mounted AC52 controller serves as the command center, supporting up to 16 doors for scalable access management. Administrators can easily configure door settings, monitor access events, and manage user credentials from a single, intuitive interface. Seamlessly integrated with Verkada’s Command platform, Access Control delivers centralized management and unparalleled visibility across your entire security system, ensuring a safe and secure environment.
Card/Phone Scanner
Flexible and Convenient Access
Verkada’s AD32 Door Reader simplifies access control by supporting various credential types, including smartphones, key cards, and fobs. With Bluetooth and NFC capabilities, users can unlock doors with a simple tap of their smartphone using the Verkada Pass app. The AD32 also features a built-in camera for enhanced security and visual verification. This sleek and durable reader seamlessly integrates with Verkada’s Access Control system, streamlining credential management and access provisioning for a frictionless user experience.
Video Intercom
Secure, Remote Access Control
Verkada’s Intercom solution combines the power of access control with live video and two-way audio communication. Installed at entry points, the Intercom device allows visitors to request access using the built-in camera, microphone, and speaker. Employees can see and speak with visitors remotely, ensuring secure and controlled access. With instant video verification and the ability to unlock doors from anywhere, Verkada Intercom enhances security and convenience. Fully integrated with Verkada’s Command platform, Intercom provides a comprehensive solution for managing and monitoring building access.
Visitor Management
Streamlined and Secure Guest Experience
Click to see our Verkada page
Tap to see our Verkada page

Training
Empowering Clients with Security Knowledge
We offer comprehensive security training programs designed to equip individuals and organizations with the skills and knowledge needed to prevent, detect, and respond to potential threats. Our courses cover a wide range of topics, including situational awareness, de-escalation techniques, active shooter response, and more, tailored to the unique needs of each client.
Deescalation
Defusing Tense Situations
Frontline staff undergo our specialized deescalation training to gain proven verbal tactics for safely diffusing confrontational, aggressive or combative behavior through active listening, controlled body language and strategic phrase selection. Learners practice target word choices and response timing in simulated exchanges with angry or irrational individuals to embed instinctual habits.
ACTIVE SHOOTER
Rapid Response Preparation
This intensive course leverages hands-on rehearsals to prepare personnel for effectively responding to armed assailant events through reinforced decision-making, tactical movement, and secured evacuation. Trainees gain confidence through realistic scenario repetitions that embed reaction habits to minimize damage from the most chaotic crisis situations.
DRUG RECOGNITION
Substance Identification & Response
Personnel complete in-depth instruction on categorizing behavioral anomalies, physical symptoms and observable evidence to accurately determine impairment caused by major drug types or combinations thereof. Graduates conduct ongoing evaluation checking for signs of narcotic, stimulant, depressant or hallucinogen usage – supporting incident deescalation, monitoring and appropriate intervention steps per substance.
WORKPLACE VIOLENCE
Risk Mitigation & Crisis Preparation
Frontline employees and managers complete this vital program covering early warning sign recognition, safe incident reporting procedures, preventative environmental/workflow adjustments, and defending basics when escape routes become blocked. Additionally, executives establish response teams, contingency protocols and essential systems for maintaining operations if assailant events unfold.
PRIVATE INVESTIGATION
Personal and Legal Evidence Collection
Our licensed private investigations leverages decades of insider law enforcement expertise in intelligence gathering, resourceful public records accessing and ethical surveillance to legally secure visual, written and verbal evidence on sensitive matters. Custom protocols driven by client objectives maximize efficiency in uncovering objective activity insights.
BACKGROUND CHECKS
Vetting & Verification
We conduct multipoint identity confirmation, document verification, reference interviews and database searches to produce confidential individual background reports for pre-employment screening or private diligence assurance. Layered checks ensure no gaps that could expose clients to risks exist across areas like credentials, criminal history and affiliation claims.
ADMINISTRATIVE INVESTIGATION
Internal Inspection & Analysis
Trained professional internal affairs investigators and analytics resources conduct impartial inspection of sensitive complaints, policy violations, employee incidents and other administrative situations needing independent objective review. We establish matter facts and supporting evidence into formal reports for clients to make informed disciplinary, procedure or staffing decisions upon.

INVESTIGATION
Uncovering the Truth with Discretion
Our experienced investigators leverage cutting-edge technology and proven methods to gather critical information and evidence in a wide range of cases, from corporate fraud to personal matters. With a focus on discretion and confidentiality, we provide our clients with the insights they need to make informed decisions and resolve complex issues.

INVESTIGATION
Uncovering the Truth with Discretion
Our experienced investigators leverage cutting-edge technology and proven methods to gather critical information and evidence in a wide range of cases, from corporate fraud to personal matters. With a focus on discretion and confidentiality, we provide our clients with the insights they need to make informed decisions and resolve complex issues.
PRIVATE INVESTIGATION
Personal and Legal Evidence Collection
Our licensed private investigations leverages decades of insider law enforcement expertise in intelligence gathering, resourceful public records accessing and ethical surveillance to legally secure visual, written and verbal evidence on sensitive matters. Custom protocols driven by client objectives maximize efficiency in uncovering objective activity insights.
BACKGROUND CHECKS
Vetting & Verification
We conduct multipoint identity confirmation, document verification, reference interviews and database searches to produce confidential individual background reports for pre-employment screening or private diligence assurance. Layered checks ensure no gaps that could expose clients to risks exist across areas like credentials, criminal history and affiliation claims.
ADMINISTRATIVE INVESTIGATION
Internal Inspection & Analysis
Trained professional internal affairs investigators and analytics resources conduct impartial inspection of sensitive complaints, policy violations, employee incidents and other administrative situations needing independent objective review. We establish matter facts and supporting evidence into formal reports for clients to make informed disciplinary, procedure or staffing decisions upon.

CONSULTING
Strategic Guidance for Optimal Security
We work closely with businesses and organizations to assess their security vulnerabilities, develop customized strategies, and implement effective solutions. Our consulting services cover a broad spectrum of areas, including risk assessment, security audits, policy development, and crisis management planning, ensuring that our clients are prepared to mitigate risks and maintain a secure environment.
RISK ASSESSMENT
Vulnerability Identification
Our risk evaluation surveys current security methods, incidents, losses, layout factors, policies, technologies and operational dynamics across client environments to systematically identify vulnerabilities in protection capabilities. Consultants quantify risks into priority classifications, including response suggestions for leadership planning and budgeting purposes toward improvement efforts.
PROCEDURES CONSULTING
Standard Establishing & Updating
Experienced consultants assist clients in creating security operations manuals tailored to their specific facilities outlining emergency response, access protocols, personnel actions, communication flows, technique guidance and regulations compliance. We also regularly review existing protocols suggesting enhancements that reflect current environments, address recurring issues through policy changes and simplify complex rules.
ONGOING ANALYTICS
Tracking, Forecasting & Adapting
Strategic analysis translates volumes of activity records, system logs and incident reports into executive briefings that contextualize root causes, emerging response gaps and projected risk trajectories. Consultants embed key performance metrics into command center displays for real-time visibility enabling data-driven decision agility.
LEADERSHIP CONSULTING
Guidance for Strategic Oversight
Experienced consultants work closely with security leadership teams to strengthen organizational governance, resource allocation and culture dynamics that ultimately dictate program successes. Focus areas span structure efficiency, hiring processes, vision setting, generational integration, data literacy, operational cadence and crisis readiness planning essential for strategic oversight.

No matter the need, B.L. Solutions is the choice.
CONTACT US TODAY!
Service Areas
Until we grow, that is…
At B.L. Solutions, we understand that the need for top-tier security services extends far beyond the boundaries of Bakersfield. That’s why we’re proud to offer our comprehensive range of security solutions to clients throughout Kern, Tulare, Kings, Fresno, Los Angeles, and Ventura counties. Whether you’re a business owner in Fresno, a property manager in Los Angeles, or an event organizer in Ventura, our team of experts is ready to provide you with the same level of dedication, expertise, and professionalism that has made us the go-to security partner for countless clients in Bakersfield. With our expanded service area, you can enjoy the peace of mind that comes with knowing your people, assets, and reputation are protected by the best in the business.
Onboarding Timeline
In just a single day, our team transforms your security landscape. With B.L. Solutions, rapid and effective security enhancements are realized within, not weeks, but one day.
Your peace of mind is our priority.
Hour 1
Initial Consultation and Proposal
• Discovery call or meeting to understand your security needs.
• B.L. Solutions crafts a tailored proposal.
Next 12 hours
Onsite Assessment and Agreement
• Onsite assessment to fine-tune security recommendations.
• Agree on the proposed solution, outline the implementation plan, and finalize terms.
Before end of Day 1
Implementation and Assurance
• B.L. Solutions executes the planned security measures.
• Continuous monitoring and support to ensure ongoing security effectiveness.