Claremont High School is a co-educational secondary school and sixth form located in Kenton, in the London Borough of Brent, United Kingdom.
Alongside their reputation for academic excellence, they also pride themselves on outstanding pastoral care, providing a very positive environment in which students thrive.
WHAT SERVICE DID THEY USE?
- Hosted VoIP Phone System
- Server Support
- Cloud Hosting
WHY DID THEY REQUIRE CONFIDENCE IT’S SERVICES?
Claremont High School servers needed upgrading/replacing and their phone system was outdated and expensive. Claremont High School also required a hosted server to host our accounting software.
WHY DID THEY CHOOSE CONFIDENCE IT AS OPPOSED TO OTHER COMPANIES?
Confidence IT were highly recommended to us by a third party. When they came to assess our IT infrastructure, they were very professional, knowledgeable and friendly.
HOW HAS CONFIDENCE IT’S SERVICES BENEFITTED THEIR BUSINESS?
Since we started working with Confidence IT, their phone system costs have significantly reduced. The school now saves over £25,000 over 5 years when compared to the previous phone system.
They have better features and the system is very reliable.
90+ phones installed across the school.
Claremont High School also have a more robust server infrastructure and Confidence IT are currently assisting them with their next phase.
“Confidence it are very knowledgeable, professional and friendly. the staff are reliable and are eager to assist when called upon.”
“Confidence it are very knowledgeable, professional and friendly. the staff are reliable and are eager to assist when called upon.”
Recent Blogs
Related posts
7 Transformative Technology Trends Changing the Way We Work
Technology is reshaping the world of work at an unprecedented pace. From artificial intelligence to web3, from the metaverse to the hybrid work model. We [...]
What Is the Most Secure Way to Share Passwords with Employees?
Breached or stolen passwords are the bane of any organization’s cybersecurity. Passwords cause over 80% of data breaches. Hackers get in using stolen, weak, or [...]
How to Organize Your Cybersecurity Strategy into Left and Right of Boom
In the pulsating digital landscape, every click and keystroke echoes through cyberspace. The battle for data security rages on. Businesses stand as both guardians and [...]