Call Us: (+91)-22-41024545 - Mail:

Who are we

We are a leading SOC 2 & ISO 9001:2015 Compliant Technology Service Provider with a PAN India presence, providing solutions to over 1800 Enterprise Customers. Having been a pioneer in the cloud services for over a decade, we have our private cloud infrastructure hosted in Three Tier 3 IDC setups, one in Mumbai, Pune & Bangalore each.

What We do

We have developed our Core Competencies in Provisioning & Configuration, Migration, Handholding, Support & Post-Sales Support of all the Products & Services of our Partner & OEMs. Our Development Team has expertise in Developing Document Sharing System ( DMS ) on Sharepoint & the very in-demand latest offering of Microsoft Power BI.

Our Core Strength

We are a Support centric Organization, providing 24*7 Support to all our valuable Customers on phone, email or through our Online Ticketing site. Our top agenda at Logix has always been providing dedicated and unmatched Support to all our Customers round the clock.

Logix Blog


Cryptojacking Attack hits Aditya Birla Group

A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group - one of India's largest business conglomerates headquartered at Mumbai.2000 plus computers were infected by cyber criminals for cryptojacking - a cyber attack where hackers misuse the victim's terminals and exploit their processing power to mine crypto currency.An Aditya Birla group spokesperson told Economic Times: Aditya Birla Group has advance threat management systems that are...Read More →

ODNS would be an internet security breakthrough

The DNS is essentially a phonebook for the Internets domain names. When any device makes the first request over the internet, the first step is typically is to look up to the domain name in the DNS for the corresponding IP address to send request to.Generally DNS query are sent in cleartext, revealing significant information such as websites the user visits, the IP and MAC addresses of the devices and also the types of devices being used by the user. Attackers can eavesdrop to fetch identity of...Read More →

Cyber criminals have discovered a new way to bypass Office 365 Safe Links

Microsofts Advanced Threat Protection (ATP) includes a feature called Safe Links. Office 365 Safe Links basically curb all the malicious links coming via phishing emails or documents. Safe Links checks the URL to see if it is blacklisted by Microsoft or any ATP customer or points to any malware. If such malicious link URL appears anywhere it is forbidden for clicking and the users are immediately informed about the same.However, researchers at Avanan say that hackers have found a way to...Read More →

Data hacked during EPFO-Aadhar seeding

Cyber criminals seem to have hacked the EPFO data which holds information like name, Aadhar card number, bank details of 2.7 Cr Indians. The vulnerabilities in Aadhar seeding with PF accounts may have been exploited to steal the data. The statement from the EPFO came amid reports of a letterallegedly written by EPFO Central Provident Fund Commissioner V P Joy to CSC's CEO, Dinesh Tyagi on 23 March flagging the data theft issue.The pension body claims of no data breach however the website...Read More →

Smartly defining RPO and RTO for Disaster Recovery Plans

Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are 2 most important parameters for a disaster recovery and business continuity plan.RPO is referred to the point in past which you will recover to in case of any disaster. In another words, it is the threshold of how much data you can afford to lose since the last backup. It limits how far to roll back in time. It defines how frequently a system is backed up. For instance if RPO is defined as 4 hours, and if a disaster occurs...Read More →

Back to Top
Enter your Infotext or Widgets here...