UDT Ranks on South Florida Business Journal’s 2019 Top Cloud Computing Companies

Share on facebook
Share on google
Share on twitter
Share on linkedin

UDT, a technology solutions company that evaluates, architects, secures and manages information technology, today announced that they have been ranked on South Florida Business Journal’s 2019 Top Cloud Computing Companies list! This prestigious list is a ranking of South Florida cloud computing companies based on the number of technicians.

“We are very proud of our cloud team,” said Gerard Amaro, Co-founder and President of UDT. “Our engineers and pre-sales resources continue to strengthen their skills and develop their knowledge in cloud computing every day.”

Amaro and UDT CEO, Henry Fleches, founded UDT almost 25 years ago in South Florida and continue to expand their business within the areas of security, digital transformation, and managed lifecycle services to their clients.

In the past, the South Florida Business Journal has named UDT one of the Top Private Companies in South Florida as well as the #1 company for Computer Networking and System Integration.

About UDT:

UDT is a technology enabler that helps clients in major industries evaluate, architect, secure, and manage technology on the go, in the rack and in the cloud. UDT provides customized services, including mobility, cloud, collaboration, loT, data, security, and ITaaS solutions and technical, professional and managed services.

Accomplish more with UDT: www.udtonline.com

About South Florida Business Journal:

The South Florida Business Journal is the leading business news outlet covering Broward, Miami-Dade and Palm Beach counties. The company’s mission is to provide business intelligence online and in print to help subscribers grow their business, advance their careers and simplify their professional lives.


Editor’s note: Interviews are available upon request.

Paula Euse
Director of Marketing


Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,