AFS Acceptance accelerates its IT capabilities with managed services from UDT

“UDT was a good choice for its breadth of expertise.”

Since 1996 AFS Acceptance has provided full-service auto financing for franchise and independent car dealers. As a recent member of the “Inc. 5000” list, AFS knows that it needs the IT capabilities that customers expect from an up-and-coming financial enterprise … and it chose UDT to help put those capabilities in place for AFS.

The Plantation, Florida-based company found that its IT system and service requirements outstripped its ability to retain head count; it required support personnel with knowledge of “the AFS way”; and, it needed a strong professional bench to provide supplemental support to accommodate growth.

“UDT was a good choice for its breadth of expertise,” said Lisa Sipe, Chief Information Officer for AFS. “We were at the mercy of, let’s say, ‘fragile artifacts’: the reliability of some servers was in doubt. They were susceptible to breakdown, threatening sensitive information. It was not a stable infrastructure.” As AFS planned to add new systems for better reliability and scalability, it went looking for a reliable partner to help build an infrastructure for tomorrow.

During the search process, “References about UDT and its service quality were outstanding,” said Rich Brand, Chief Technology Officer with QAT Global, a consultant retained by AFS. “Their technical and sales presentation fulfilled all requirements. Their sales staff responded to AFS’s shifting needs during the RFP period. And, they came highly recommended by trusted advisor to senior AFS management.”

UDT worked with AFS on multiple levels: they offered a managed services approach with a team to manage the infrastructure for stability, scalability and reliability. In addition, AFS was migrating to Microsoft Office 365 software as a service. And, UDT was able to provide help desk support, to get AFS through the transition. “It was nice to leverage for day-to-day support as well as special requirements,” said Sipe.

Even the best transitions bump up against challenges, she conceded. “It’s easy to find a fair-weather partner, but that’s never the case. The best part about UDT is how they worked through difficulties, put a great conflict resolution process in place, and showed a real desire to see the customer succeed.”

The relationship continues and currently AFS Acceptance and UDT are considering recommendations for new architecture, addressing disaster recovery improvements, and refining their more stable operating environment. The basics are taken care of, now we can move on to address other projects, she said.

AFS maintains a relatively small but vital in-house IT staff, relying on UDT’s deep bench of specialized expertise to address issues as needed.  “I think of UDT as my partner,” said Sipe. “The role they play is something I don’t have, and we’re working together as colleagues, not competition.”

Enjoy a 360° relationship with UDT

AFS Acceptance is but one of many organizations that have discovered the advantages of Managed IT as a Service from UDT. Contact us today and let us demonstrate how we can help you reduce the risk, cost and complexity of managing IT solutions.

Accomplish More With UDT

Get your custom solution in cybersecurity, lifecycle management, digital transformation and managed IT services. Connect with our team today.

More to explore

K12 Budgeting: Planning Your 1:1 Device Refresh Program Cost

As K12 education evolves, managing 1:1 device programs effectively is crucial. These programs, providing each student with a personal computing device, play a pivotal role in modern education. Success demands strategic planning, communication, foresight, and a holistic approach to device management. With digital learning on the rise, these devices are more than just tools for accessing information; they are platforms for interactive, core learning experiences. However, funding remains a significant hurdle, making effective budgeting for your device refresh program essential for optimizing ROI and device longevity.

Crafting a Futureproof 1:1 Device Strategy for School Districts

In the evolving landscape of Education Technology, crafting a futureproof 1:1 device strategy is crucial. This strategy should link every student, teacher, and administrator experience with specific device specifications. The integration of educational apps into the curriculum can significantly enhance the learning environment. These apps, tailored to the needs of students, can provide interactive content, fostering a dynamic learning experience.

Optimizing Your K12 Tech Investments: Funding 1:1 Device Programs

This blog will guide school districts grappling with the financial and resource demands of implementing a successful 1:1 device program amid ongoing challenges of budget constraints and competing priorities. Our guided workbook, created in partnership with Intel, provides further support with personalized roadmap on “Pathways to Innovation: Building a Sustainable Digital Learning Environment”.​

K12 Cybersecurity: How to Secure 1:1 Devices in Your School District

This blog post delves into the importance of security, cybersecurity, and data privacy in school districts implementing 1:1 device initiatives. It offers basic steps for evaluating, planning, and executing a security strategy. Our guided workbook, created in partnership with Intel, provides a personalized roadmap on “Pathways to Innovation: Building a Sustainable Digital Learning Environment”.

Lost & Stolen Devices are a Serious Data Security Threat—Here’s Why

Since the pandemic, remote and hybrid work has become the norm. While mobile devices and remote workstations have empowered great flexibility, it has also led to an increase in data security problems due to lost, misplaced, or stolen devices. Find out how remote and hybrid setups are contributing to this problem and how to protect yourself and your organization.​

Ransomware Gangs Adding Pressure with ‘Swatting’ Attacks—Here’s What You Need to Know

Ransomware gangs are implementing new extortion tactics to encourage victims to pay up. Swatting is becoming an increasingly popular tactic. It involves calling law enforcement to falsely report a serious, in-progress crime triggering an extreme response such as an armed raid from the SWAT team. Explore how cybercriminals are using this tactic and what you can do to prevent it from happening to you.​

Experiencing a security breach?

Get immediate assistance from our security operations center! Take the following recommended actions NOW while we get on the case:

RECOMMENDED IMMEDIATE NEXT ACTIONS

  1. Determine which systems were impacted and immediately isolate them. Take the network offline at the switch level or physically unplug the systems from the wired or wireless network.
  2. Immediately take backups offline to preserve them. Scan backups with anti-virus and malware tools to ensure they’re not infected
  3. Initiate an immediate password reset on affected user accounts with new passwords that are no less than 14 characters in length. Do this for Senior Management accounts as well.

Just one more step

Please fill out the following form,