Call Us: (+91)-22-41024545 - Mail:

Who are we

We are a leading SOC 2 & ISO 9001:2015 Compliant Technology Service Provider with a PAN India presence, providing solutions to over 1800 Enterprise Customers. Having been a pioneer in the cloud services for over a decade, we have our private cloud infrastructure hosted in Three Tier 3 IDC setups, one in Mumbai, Pune & Bangalore each.

What We do

We have developed our Core Competencies in Provisioning & Configuration, Migration, Handholding, Support & Post-Sales Support of all the Products & Services of our Partner & OEMs. Our Development Team has expertise in Developing Document Sharing System ( DMS ) on Sharepoint & the very in-demand latest offering of Microsoft Power BI.

Our Core Strength

We are a Support centric Organization, providing 24*7 Support to all our valuable Customers on phone, email or through our Online Ticketing site. Our top agenda at Logix has always been providing dedicated and unmatched Support to all our Customers round the clock.

Logix Blog


Why Blockchain may not be the elixir to internet security

Every architect, builder and designer knows that the right tool can solve the most difficult problems in a jiffy but at the same time, that tool cannot be right for all the situations.There are a lot of confusions running around regarding Blockchain. Many consider it equivalent to bitcoins although both are different, bitcoin being a cryptocurrency and blockchain is a digitized, distributed and secure ledger guaranteeing immutable transactions, the technology which is used in bitcoins. Everyone...Read More →

Cyber Security challenges for CXO

Technology is evolving rapidly and so are the cyber risks. It is a big responsibility on the shoulders of CXO (C-level Officers) to keep their organizations data safe and secure from any data breaches such as DDOS attacks. CXO have to lead the effort in developing a roadmap of what exactly are their security needs, how they are aiming to achieve them and how they can make the process flexible in order to make it change friendly as the attacks evolve in future.Some of the biggest security...Read More →

Top 3 cyber security concepts for 2018

Cyber security is taking a new turn every year. Its very crucial to stay updated with the latest cyber security concepts and solutions to thrive in the market. The 2018 RSA Conference was exceedingly productive and proactive in bringing out latest cyber security concepts instead of relying on the outdated, legacy ones. Here is a list of top 4 security concepts of 2018:Artificial Intelligence (AI)In a higher than ever connected world, security must evolve to stay abreast with current as well as...Read More →

Internet Explorer Zero-day "Double-kill"

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code, host website and lead the victim to view compromised websites. Kaspersky and Qihoo360 independently discovered this zero-day vulnerability (CVE-2018-8174) for Internet Explorer used mainly for stealing information. This vulnerability had first time marked its presence two years ago. It is...Read More →

Cryptojacking Attack hits Aditya Birla Group

A big cryptojacking attack took place first time in the country last month. The target was the Aditya Birla Group - one of India's largest business conglomerates headquartered at Mumbai.2000 plus computers were infected by cyber criminals for cryptojacking - a cyber attack where hackers misuse the victim's terminals and exploit their processing power to mine crypto currency.An Aditya Birla group spokesperson told Economic Times: Aditya Birla Group has advance threat management systems that are...Read More →

Back to Top
Enter your Infotext or Widgets here...