Call Us: (+91)-22-41024545 - Mail:

Our Vision

To be the first choice for the customer’s IT needs with complete customer-centricity.

Who are we

We are a leading SOC 2 & ISO 9001:2015 Compliant Technology Service Provider with a PAN India presence, providing solutions to over 1800 Enterprise Customers. Having been a pioneer in the cloud services for over a decade, we have our private cloud infrastructure hosted in Three Tier 3 IDC setups, one in Mumbai, Pune & Bangalore each.

What We do

We have developed our Core Competencies in Provisioning & Configuration, Migration, Handholding, Support & Post-Sales Support of all the Products & Services of our Partner & OEMs. Our Development Team has expertise in Developing Document Sharing System ( DMS ) on Sharepoint & the very in-demand latest offering of Microsoft Power BI.

Our Core Strength

We are a Support centric Organization, providing 24*7 Support to all our valuable Customers on phone, email or through our Online Ticketing site. Our top agenda at Logix has always been providing dedicated and unmatched Support to all our Customers round the clock.

Logix Blog


Spear phishing is on the rise in 2019

One of the most dangerous and highly successful type of cyber attacks is spear phishing attacks. This is a highly sophisticated well engineered attack to penetrate into the defense of a targeted victim and has high likelihood of success. The attackers knows enough about the victim to communicate with the victim as an alias and dupe the victim by infiltrating the system or network.Phishing and Spear PhishingWhile phishing is in general going after large number of low yield target whereas spear...Read More →

Latest cryptomining malwares uninstalls cloud security software

This is a new bread of malware! A very new malware is seen accomplishing never before seen function - uninstalling cloud security products! This new malware is capable of taking admin rights on targeted system by uninstalling the cloud-security products. Multiple occasions of the malicious activity are tied to coin-mining malware targeting Linux servers. One interesting observation made by the Palo Alto networks is that these malware do not attack the cloud security but just uninstall them...Read More →

Web applications: new back-doors to access private data

Multiple rogue web applications can be used to attack vulnerable browser extension and exploiting private data becomes easier for adversaries post the access is granted. This is alarming mainly because a normal person browsing the internet is caught unaware of something like this even exists.Various browsers - Chrome, Firefox, Opera extension have been tested and proved to be compromised by the adversaries with right motivation to do it. This can lead to theft of sensitive data residing on a...Read More →

Important cybersecurity statistics for 2019

Digital economy is growing everywhere in the world. Technology is changing our livelihoods in unprecedented ways. We cannot imagine life without internet or without using technology in our day-to-day chores. It has certainly altered the natures way of evolution, but it also means that there is a very different kind of warfare happening all the time. Cyber attacks have been in the news in past decade and they only seem to increase causing more damage to businesses, raking more money for the...Read More →

Chinese hackers swindles Rs. 130 crore from an Indian arm of an Italian company

A Chinese hackers team stole 18.3 million dollars (Rs. 130 Crore)from the Indian arm of Italian company Tecnimont SpA by taking local managers into confidence that the money was required for an acquisition, one of the biggest cyber heists in the country, theEconomic Timesreported.The hackers sent emails to the head of Tecnimont Pvt Ltd, the Indian subsidiary of Milan-headquartered Tecnimont SpA, through an email account that looked deceptively similar to that of group CEO Pierroberto Folgiero,...Read More →

Back to Top
Enter your Infotext or Widgets here...