Call Us: (+91)-22-41024545 - Mail:

Who are we

We are a leading Technology Service Provider with a PAN India presence, providing solutions to over 1500 Enterprise Customers. Having been a pioneer in the cloud services for over a decade, we have our private cloud infrastructure hosted in Three Tier 3 IDC setups, one in Mumbai, Pune & Bangalore each.

What We do

We specialize in Enterprise Messaging & Collaboration, Network & Cloud Security, High Availability Backup & Disaster Recovery Solutions for the Enterprise Business users with the Cloud or On-premise Setup’s.

Our Core Strength

We are a Support centric Organization, providing 24*7 Support to all our valuable Customers on phone, email or through our Online Ticketing site. Our top agenda at Logix has always been providing dedicated and unmatched Support to all our Customers round the clock.

News & Announcements


Zimbra Collaboration Two-factor Authentication: Be more Secure

Two-factor authentication, or 2FA as it is commonly abbreviated, is a technology that provides identification of users with the combination of 2 different components. It adds an extra step to your basic log-in procedure. Without 2FA, only username and password are required for login. The second factor adds more security to your account. 2FA requires the user to have two out of three types of credentials before being able to access an account. The three types are: Something you know, such as a...Read More →

5 cybersecurity question every CIO must ask in 2017

There has been a far greater responsibility on the Chief Information Officers(CIOs) to understand the challenges, solutions and trade-offs in terms of the organizations they are a part of. It is equally crucial that CIOs understand the plans and programs companies undertake to address the issues so that a better representation of the entire breadth of IT initiatives can be supported. Risk management has majorly been a high inertia subject for most companies and it is this unwillingness which...Read More →

Advanced email security for e-mail hoax. Be safe!

Email are the lifeline of business communication and have been an important vehicle for cyber intrusion for cyber criminals.The sheer volume of emails being opened makes them a very easy and vulnerable target spots. A Symantec report suggests that there were about 198 billion emails in circulation each day in 2016. Also, another study suggests that 79% ransomware attacks and over 90% targeted attacks start with an email, hence email security is very essential.Business email compromise (BEC or...Read More →

CIO Strategies for selecting the best-in-class Collaboration Tool

Imagine working on a new software launch where the designers, engineers and marketing teams are spread across different countries and hence different time zones. In this scenario to get everybody on the same page and ensuring each one has the access to the latest files is a real challenge. A smart collaboration tool is The Saviour in this situation. With its ability to organize and manage projects as well as smoothening the workflow in real time, makes an organization more efficient and...Read More →

How to avoid Equifax breach with regular Vulnerability Assessments ?

Ever higher than before, the frequency and scale of cyber breaches continue to startle everyone. In this case, cyber thieves, via Equifax breach, made off with highly sensitive personal information including social security and credit card numbers of about 143 million users.However, one interesting information has surfaced that Equifax knew about the breach much before it went public with the news. The vulnerability was known to exist since March 2017, the breach occurred mid-May through July...Read More →

Back to Top
Enter your Infotext or Widgets here...