Platte River Networks Receives 2018 Best of Thornton Award

THORNTON October 26, 2018 – Platte River Networks has been honored with the 2018 Best of Thornton Award in the Computer Network Design & Systems category by the Thornton Award Program.

Each year, the Thornton Award Program identifies companies that have achieved exceptional success in their local community and business category; local companies that enhance the positive image of small business through service to their customers and the community. These exceptional companies help make the Thornton area a great place to live, work and play.

“For 16 years we have provided IT services to the Thornton business community,” said Brent Allshouse, CFO and Co-founder of Platte River Networks. “We are thrilled to receive this prestigious award for our continued partnership with Thornton and its community.”

Various sources of information were gathered and analyzed to choose the winners in each category. The 2018 Thornton Award Program focuses on quality, not quantity. Winners are determined based on the information gathered both internally by the Thornton Award Program and data provided by third parties.

About Platte River Networks

For the past 16 years, Platte River Networks, a technology consulting and managed services firm based in Denver, CO, has provided complete IT services to small-mid-enterprise businesses throughout the United States, with a prominent presence in their home state of Colorado. Their depth of expertise and commitment to quality has resulted in hundreds of diverse clients across a variety of industries. Platte River Networks provides infrastructure design, procurement, implementation, monitoring and management including security, help desk, projects and virtual CIO services.

See the full press release here

The Resource Hub

Get Complete Managed Services Insights

Visit our Resource Center for up-to-date news and stories for technology and business leaders.


Ransomware Threats in 2024

Ransomware is malicious software that encrypts files or entire computer systems, demanding payment for a decryption key. It exploits vulnerabilities through methods like phishing emails

Three IT Service Techs Working together at desks in office

Move Forward with IT Services for Business

Use managed services for small and mid-sized businesses that help you reach your goals.

Work With Us