Enjoy the latest phone features without having to replace your entire legacy phone system -OR- consider a new modern, customizable and scalable VoIP solution.
Kari’s Law requires direct 911 dialing and notification capabilities in Multi-Line Telephone Systems (MLTS). Our system will alert your property/administrative personnel via email, SMS or phone call. Set schedules of who gets alerted when, and maintain proper logs.
Ray Baum’s Act ensures that a “dispatchable location” is conveyed with 911 calls to dispatch centers, regardless of the technological platform used. Using our real-time database, all the proper information is inserted into the emergency call and transmitted - making you instantly compliant.
Our system is not only compliant with Kari’s Law and RAY BAUM’S Act, but includes a verification procedure for each outbound line in your building(s) per FCC mandates.
Keep your phones afloat in case your PBX or Primary PRI goes down with a Backup PRI!
Provide instantaneous incoming-calls recovery.
Safeguard your staff’s privacy while using their personal cell phones for work by masking their private number with the school number: PriVeil.
Basic technical support including online and telephone-based technical support.
Software upgrades and patches including bug fixes and security patches.
Services provided for the operation, management, and monitoring of eligible broadband internal connections are eligible managed internal broadband services (e.g., managed Wi-Fi).
Eligible expenses include the management and operation of the LAN/WLAN, including installation, activation, and initial configuration of eligible components and on-site training on the use of eligible equipment.
Eligible products necessary to transport information to classrooms or publicly accessible areas of a library, such as access points, routers, switches, firewall, racks, caching, hubs, and wiring.
Eligible products necessary to transport information to classrooms or publicly accessible areas of a library, such as access points, routers, switches, firewall, racks, caching, hubs, and wiring.
Monitor what’s going on in your office or school’s premise with a Video Surveillance System!
MetComm’s Closed-Circuit Television (CCTV) is composed of a system of wireless cameras with exceptional image clarity, monitors/display units, and recorders.
Identify abnormal events or behavior and protect your working environment.
We install, deploy and maintain the system based, as always, on a site-survey to determine your requirements and tailor the solution to your needs & budget.
October 8, 2021: President Biden signs K-12 cybersecurity act into law.
This law initiates a review of K-12 cybersecurity risks and will give resources to school districts to help them protect themselves against cyberattacks.
Vulnerability to cyber-attacks can destroy IT systems. What will you do if there’s unplanned disruption in service?
In these trying times a well-thought out, cogent, Business Continuity Plan will give you and your organization peace of mind. Whether it’s on-site or remote or Hybrid – ensuring you service continuity is within our DNA.
Our clients have NEVER lost a single piece of data on our watch because we offer:
Fast, reliable, and affordable – that’s how you want your internet services! No unexpected “construction” costs! No pressure in signing up from the carrier. Have more suitable services become available in your area? – we will adjust your order accordingly!
Ensure a powerful connection to meet the new cyber demands with MetComm’s Dedicated Fiber – with our Service Level Agreement (SLA), we are committed to the level of service the carrier intends to provide.
Guaranteed Bandwidth – dedicated & fully scalable, bandwidth meeting your consumption pattern, uptime guarantee min. 99.9999%, ideal for campus to campus service, supports Voice over IP (VoIP), suitable for audiovisual broadcast.
Enjoy the continuity of services and peace of mind by having a single provider that can ensure the efficient, secure and seamless integrated functioning of these systems and more!
1. Hard-wired and Wireless Networks 2. Managed Backend – Users 3. Data Access and Data Security 4. Managed Cloud Services 5. Voice and VoIP Telephony Services 6. Security Systems