how to make your own website

 

Your Trusted Wireless and Security Experts


Engineering your wireless network security and troubleshooting your Wi-Fi with our industry leading, end-to-end solutions.

PacketLogix is a reseller of specialized network technologies primarily focused in the IT security and wireless networking fields. We assist our customers in the design, acquisition, imlementation, and training on the solutions which we implement. 

Engineering your wireless network security and troubleshooting your Wi-Fi with our industry leading, end-to-end solutions.

cloud

Cloud

Now that cloud based services are the norm rather than a rarity, PacketLogix works with you to get to the most effective cloud based platforms for your business.

read more

infrasture icon

Infrastructure

PacketLogix specializes in network performance and mobility and we offer architecture design and planning for optimal deployment of your infrastructure.

read more

visibility icon

Visibility

Knowing that network challenges are more often housed within an application rather than the network itself, PacketLogix is positioned to peer into your network and give you the most effective solutions.

read more

security icon

Security

Our proactive security solutions include on-premise, hybrid-cloud, and full cloud based networks depending on your security needs.

read more

wireless icon

Wireless

As wireless technologies take over as our primary means of network communications, PacketLogix offers best-in-class solutions to your wireless network design and deployment needs.

read more

Providing your Wi-Fi and network security on any scale

Founded in 2002, our original focus was to help businesses peer into their networks, from the big picture down to the packet level.

An engineering-first company, our goal was to help businesses follow best practices for their networks.  As networks have evolved from wired to wireless to cloud-centric, PacketLogix has consistently offered best-in-breed technology solutions.

Questions?

Our Partners

  • HPE

    Infrastructure HPELogo

     

  • Microsoft Office 365

    Cloud MSO365

  • NetScout

    Visibility NetScout Logo

     

  • Microsoft Azure

    Cloud MSAzure

  • AdTran

    Infrastructure AdtranLogo

     

  • VMware

    Infrastructure vmware logo

     

  • Trend Micro

    Security trendmicro logo

  • VASCO

     

    Security VASCO logo

  • Xirrus

    Xirrus logo

  • Arbor Networks

    Security ArborNetworksLogo

  • Carbon Black

    Security CarbonBlacklogo

     

  • Proofpoint

    Security ProofPointLogo

  • ProtectWise

    Security ProtectWiseLogo

  • Fluke Networks

    Visibility fluke networks logo

  • Ixia

    Visiility IxiaLogo

  • Airmagnet

    Wireless AirMagnet

  • Aruba

    Wireless ArubaNetworksLogo

  • BridgeWave

    Wireless BridgeWaveLogo

Latest Blogs

Incident Response Workshop with Arbor Networks at PacketLogix

Security ArborNetworksLogo Logo for Fiverr

 

 

 

presents

                                                                               

Incident Response Workshop

October 26, 2016

A dynamic session on how to hunt down complex

cyber-attacks lurking on a company's network

·         

Acquire new skills for fast investigation,

while learning how to connect the subtler signs of a cyber "break-in"

·         

When: Wedesday, October 26, 2016, 12:00 noon - 7:00 pm

Where:  PacketLogix Engineering Office, 16 Cutler Street, Warren, RI

What You’ll Need:  A laptop or tablet for the simulation exercise

What You’ll Get:  A WIRELESS DRONE  will be awarded to the winner

How to Register:  Email workshops@packetlogix.com or call Laura at (401) 237-0023

Scenario

The students have been summoned because the "executive team" was given a heads up that their network "WindResources, Inc." has been compromised.  They need to work in teams (or individuals) to determine if there has been an Infrastructure breach and/or Information breach.

The threat landed on the network on "Day 0," you have 3 hours to determine Initial compromised host, IOC, C2, lateral movement and data ex-filtration.

We’ll have checkpoints every 30 minutes and make students give readouts to the "CISO."  A data exfiltration piece maybe included if time allows.  At the end, students will give a readout and a winner shall be chosen based on performance.

Each individual or team will have their own "pod" and each pod is a mirror copy of each other so you are all working from the same data set.

Register now by emailing workshops@packetlogix.com or call Laura at (401) 237-0023

There will only be 15 slots, so please register early!

Learn More

How Safe is Your Email?

spam buttonEmail is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Upstate New York small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Learn More

Latest Blog

        presents                                        &...

Latest News

PacketLogix is proud to announce the launch of our new website at http://www.packetlogix.com/. The goal of the new website is to make it easier for our existing clients and to provide more information about our services for prospective clients.