Search

Frequently Asked Questions

MICA and Mitigate

CoreLogic Mitigate™ is a mobile application specifically designed for water mitigation technicians to capture project documentation and technical drying data in the field in real time. Built on the foundation of the industry leading process documentation platform, MICA, CoreLogic Mitigate is the next step in the evolution of water mitigation process documentation software.

No, once Mitigate is available for download in the App Store and Google Play, all you will need to do is download Mitigate™ and use your existing MICA™ login credentials to start using the new app!

If you would like to sign up for a Mitigate™ account, please click here.

Mitigate™ is an all-new application that replaces the MICA™ mobile application. Data captured in Mitigate includes all the data you would have captured in MICA™, presented in a much more modern, efficient, and simplified interface. Mitigate™ also includes several entirely new features to document water mitigation projects more efficiently.

Some property insurance carriers require the use of MICA™ to document their water mitigation claims. Mitigate™ is a direct replacement for the MICA™ mobile app, so it also satisfies that requirement. You can use Mitigate™ for any managed repair program that requires you to use MICA™.

Mitigate™ will benefit you and your business by providing an easy-to-use, repeatable process for consistently gathering the required documentation on water mitigation projects in less time and with less effort than other applications. Specifically designed with technicians in mind, Mitigate™ provides a simple, yet comprehensive workflow that allows field personnel to stay focused on what matters most: restoring water damaged properties. By using Mitigate, you can reduce project cycle times, eliminate communication and operational inconsistencies, and face fewer challenges against the job through complete documentation.

Yes – Mitigate has been built on a platform that makes the application virtually identical on all operating systems. In iOS and Android, you will be using the same application. The only difference between the two comes down to hardware limitations: iOS devices with LIDAR can leverage the powerful Mitigate Room Scanning feature.

Yes – Mitigate includes a setting that allows you to select your preferred language: English, Spanish, or French-Canadian. Training for the application is also available in Spanish.

Mitigate™ will be available in the App Store and Google Play in Spring of 2024. We will communicate a specific launch date for Mitigate™ soon.

With the release of Mitigate™, some enhancements are being made to your MICA web environment to accommodate new data fields in Mitigate™. However, the general interface and features in the MICA web application will look the same initially.

The next phase of the Mitigate project will include a full redesign of the MICA Web experience. More will be communicated on this second phase of the Mitigate project later this year.

We are offering live webinars, recorded webinars, and on-demand training courses in our CoreLogic Learning Center that will be available when Mitigate launches. You can view all the training options and support resources here.

Registering for MICA is quick and easy. See our registration form here to start the process.

DASH

Yes, DASH Mobile is available for both iOS and Android. All updates made on the technician’s mobile device are automatically updated in the main database, so your office team is always up to date.

Yes, you can still make changes in the DASH job file when you are offline through DASH Mobile. When you are back in service range DASH will automatically synch the new data to the main job file, saving you time and money.

DASH integrates with numerous programs to ensure a seamless experience within your existing workflow. Programs including, but not limited to, Quickbooks (online and deskstop), Sage100, Sage 300, Claims Connect, MatterPort, DocSketch, LuxorCRM, MICA and more. Send us a message to inquire about specific programs if you do not see it listed here.

Our training team provides hands-on training for each of your staff members according to their specific job function to ensure they know how to get the most out of DASH’s features. Any new staff or contractors hired after the initial onboarding period will also be able to go through the same training to get started. Any employees who wish to further their education can do so with our advanced courses in CoreLogic Learning Community.

CoreLogic Protect is committed to protecting the confidentiality, integrity, and availability our DASH, MICA, SettleAsist, MoistureMapper, and Luxor customers’ data. We partner with World Class Data Center Providers that heavily invest in cyber security ensuring that our customer data resides in a highly secure environment. These data centers are independently audited and have attained the following world-wide recognized security framework and quality management certifications:

  • SOCS Type 2 1, 2, 3
  • ISO 27001:2013
  • HITRUST
  • ISO 9001:2015

These partners also enable us to deploy critical security systems including Azure Sentinel (SIEM), Azure Web Application Firewall and Azure Security Center to continuously protect, monitor and alert on security. These Microsoft Azure systems continuously monitor infrastructure for anomalies using state-of-the-art machine learning. Finally, Next Gear also engages with industry leading security firms to conduct manual penetration and automated vulnerability scanning on our applications.

CoreLogic adheres to NIST framework security standards for all operational and development process security activities. All applications have a well-define system development life cycle and change management process. Our software is developed and then put through a very thorough quality assurance process to ensure our high-quality standards. All Next Gear software products are rigorously security tested through Veracode’s Application Security Program engine. All applications are scanned regularly using the Veracode engine to ensure that our applications meet or exceed Open Web Application Security Project (OWASP) best practices. This includes both a scan of the application code as well as the web application infrastructure. In addition, we have deployed Intruder vulnerability scanner to continuously scan infrastructure endpoints for over 9000 known vulnerabilities and growing. The Intruder system adds newly discovered v

Engage

No. Those will have to be done separately.

Yes. You can choose to send the Engage link to not only the individual labeled as a customer, but you can also send it to the Loss Contact. The Engage link can be sent to Property Managers or other external participants, as well.

This is because you have not allowed Location Services with the Next Gear Mobile  Application. You will need to uninstall/reinstall the app and then when you click “on the way,” make sure to allow.

Some cellular service carriers will split SMS messages due to character limits per message.

Yes. An invite can be sent to any contact in the Contact Manager so they can contribute to the job.

No. There is no limit to the amount of individuals you can invite to ProAssist.

Yes. With the BI reporting tool, reports can be built about the information that comes from ProAssist.

Product Support

CoreLogic Protect is committed to protecting the confidentiality, integrity, and availability our DASH, MICA, SettleAsist, MoistureMapper, and Luxor customers’ data.  We partner with World Class Data Center Providers that heavily invest in cyber security ensuring that our customer data resides in a highly secure environment. These data centers are independently audited and have attained the following world-wide recognized security framework and quality management certifications:

  • SOCS Type 2 1, 2, 3
  • ISO 27001:2013
  • HITRUST
  • ISO 9001:2015

These partners also enable us to deploy critical security systems including Azure Sentinel (SIEM), Azure Web Application Firewall and Azure Security Center to continuously protect, monitor and alert on security.  These Microsoft Azure systems continuously monitor infrastructure for anomalies using state-of-the-art machine learning. Finally, Next Gear also engages with industry leading security firms to conduct manual penetration and automated vulnerability scanning on our applications.

CoreLogic adheres to NIST framework security standards for all operational and development process security activities.  All applications have a well-define system development life cycle and change management process.  Our software is developed and then put through a very thorough quality assurance process to ensure our high-quality standards. All Next Gear software products are rigorously security tested through Veracode’s Application Security Program engine.  All applications are scanned regularly using the Veracode engine to ensure that our applications meet or exceed Open Web Application Security Project (OWASP) best practices. This includes both a scan of the application code as well as the web application infrastructure. In addition, we have deployed Intruder vulnerability scanner to continuously scan infrastructure endpoints for over 9000 known vulnerabilities and growing.  The Intruder system adds newly discovered vulnerabilities daily.

All scoped data is encrypted whether at-rest or in transit.  Next Gear uses AES256 encryption algorithm for data at-rest. This includes file storage as well as database data.  Data in transit is encrypted via secure RSA 2048 certificate using web TLS 1.2 and above. Next Gear encryption keys are securely managed via Azure Key Vault.

We employ a team of expert site reliability engineers and database administrators who are continually patching (every 30 days), performance tuning, and managing all Next Gear Solutions systems 24x7x365.  All scoped production systems are configured for threat and vulnerability monitoring and alerts are sent to this group for investigation of root cause.

Finally, we engage with third-party security vendor to conduct manual penetration testing on an annual basis.  All findings from the penetration test are investigated and remediated.  In addition we have engaged an external auditor and is working on obtaining SOC 2 Type II certification.  We anticipate that certification will be complete in Q4 of 2022 following a 9-month audit period.

Rest assured we take the security of our customers’ data very seriously.

Need technical support? Call us at (866) 769-7855. We’re available 24/7 for our valued customers.

We pride ourselves in a consultative approach to ensure your teams are realizing the value in the tools you’ve invested in. Whether its onboarding your existing team when you first sign on, hire new employees, or want on going training to become a power user, we are here to partner with along the way. Please visit our Training and Implementation page for specific details.

Schedule a consultation today to get started.

Request a Demo
linkedin sales solutions XosyhRSo unsplash

Need assistance or have any questions? Get in touch with us today!

Contact Us