Cyber attacks targeting EU-based organizations are increasing, and SMEs are often the entry point into larger supply chains.
We deploy Identity and Access Management and Zero Trust Network Access to secure your environment and address GDPR and NIS2 compliance requirements.
Identity and network access are the primary entry points for attacks. Most breaches stem from weak setups and unreviewed permissions, not sophisticated exploits.
We replace fragmented directories with a centralized system covering SSO, automated provisioning, and regular access reviews.
We implement the best fit for your team and budget, utilizing commercial platforms:
Or mature open-source tools:
We replace outdated VPNs and firewall rules with a Zero Trust layer tied directly to your identity system. This ensures consistent enforcement and full audit logging across internal, cloud, and on-premise environments.
We deploy leading enterprise platforms or open-source solutions like NetBird.
We map identity flows, test access controls, and deliver a prioritized report of gaps and quick wins. There is no obligation or pitch.
If the findings make sense, we move forward together. If not, you walk away with a clear roadmap of your environment for free.
We build, deploy, and fully test the solution. We document the entire setup so your team can maintain it independently.
The deliverable is a clean system that doesn't require our intervention every time someone needs access.
We offer monthly health checks or full SOC services with 24/7 monitoring. You choose the level that matches your risk tolerance.
With these foundations in place, your environment will also be in a significantly better position for compliance frameworks like ISO 27001 or SOC 2.
Implementation cases across different environments and scales.
A unicorn-track company needed to build its identity and network access infrastructure from scratch as they scaled to 300 people amid rapid cloud growth.
We designed and implemented full AAA and ZTNA from the ground up, embedding automation from day one.
Following an audit that revealed significant access control gaps across US, European, and Asia operations, we rebuilt their identity infrastructure and integrated a global ZTNA layer.
An audit revealed inconsistent, unaudited access to internal tools and cloud resources across a distributed international workforce of contractors.
We rebuilt their identity stack and deployed a fully integrated ZTNA solution.
Valery Levchenko handles all complex security work personally.
15 years in security. NSO Group (cyber intelligence). Noname Security (API security). Qwilt (CDN infrastructure). CISSP certified. MCSE Security. AWS Security Specialty. IAM/CIAM specialist.
50+ security engagements completed, including identity infrastructure builds and ZTNA deployments across startups, international public companies, and distributed SMEs. The three cases above are direct engagements with ongoing support in place.
We do the architecture, design, and implementation. You review and approve. Point Solutions is registered in Montenegro and serves clients across Europe and internationally.
The Stage 1 audit is free. After that, pricing depends on your environment, not on a fixed package.
The audit costs nothing and commits you to nothing. You walk away with a clear picture of where you stand and a prioritized list of what needs attention.