UDT’s Charles Grau Receives South Florida Business & Wealth’s 2016 Apogee Awards

Share on facebook
Share on google
Share on twitter
Share on linkedin

DORAL, Fla.  – November 8, 2016 – UDT, a technology solutions company which evaluates, architects, secures, and manages information technology for organizations of all sizes, today announced that Chief Information Officer of Information Technologies Charles Grau has been honored as a recipient of the 2016 Apogee Awards. The annual awards, presented by South Florida Business & Wealth magazine, recognize distinguished C-suite leaders in South Florida.

Grau, with 15 years of executive experience, leads UDT’s information technology strategy and technological initiatives. Prior to joining UDT, he served as vice president of information technology at AeroTurbine.

“Charles’ highly valued knowledge and experience bring significant benefit to UDT and our clients, and we are proud to see him receive this recognition,”

said Henry Fleches, chief executive officer of UDT.

Grau received bachelor’s and master’s degrees in information technology from American Intercontinental University and a master’s degree in business administration from the Keller Graduate School of Management. He has served as president and member of the board of trustees of the iCoast CIO Council for the past five years and is a member of the Institute of Electrical and Electronics Engineers.

About UDT

UDT is a technology enabler that helps clients in major industries evaluate, architect, secure, and manage technology on the go, in the rack and in the cloud. UDT provides customized services, including mobility, cloud, collaboration, loT, data, security, and ITaas solutions and technical, professional and managed services. Accomplish more with UDT: www.udtonline.com

Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,