Search

Frequently Asked Questions

MICA

Registering for MICA is quick and easy. See our registration form here to start the process.

DASH

Yes, Next Gear Solutions Mobile is available for both iOS and Android. All updates made on the technician’s mobile device are automatically updated in the main database, so your office team is always up to date.

Yes, you can still make changes in the DASH job file when you are offline through DASH Mobile. When you are back in service range DASH will automatically synch the new data to the main job file, saving you time and money.

DASH integrates with numerous programs to ensure a seamless experience within your existing workflow. Programs including, but not limited to, Quickbooks (online and deskstop), Sage100, Sage 300, Claims Connect, MatterPort, DocSketch, LuxorCRM, MICA and more. Send us a message to inquire about specific programs if you do not see it listed here.

Our training team provides hands-on training for each of your staff members according to their specific job function to ensure they know how to get the most out of DASH’s features. Any new staff or contractors hired after the initial onboarding period will also be able to go through the same training to get started. Any employees who wish to further their education can do so with our advanced courses in Next Gear University (we will make this a link to the training page).

CoreLogic Protect is committed to protecting the confidentiality, integrity, and availability our DASH, MICA, SettleAsist, MoistureMapper, and Luxor customers’ data. We partner with World Class Data Center Providers that heavily invest in cyber security ensuring that our customer data resides in a highly secure environment. These data centers are independently audited and have attained the following world-wide recognized security framework and quality management certifications:

  • SOCS Type 2 1, 2, 3
  • ISO 27001:2013
  • HITRUST
  • ISO 9001:2015

These partners also enable us to deploy critical security systems including Azure Sentinel (SIEM), Azure Web Application Firewall and Azure Security Center to continuously protect, monitor and alert on security. These Microsoft Azure systems continuously monitor infrastructure for anomalies using state-of-the-art machine learning. Finally, Next Gear also engages with industry leading security firms to conduct manual penetration and automated vulnerability scanning on our applications.

CoreLogic adheres to NIST framework security standards for all operational and development process security activities. All applications have a well-define system development life cycle and change management process. Our software is developed and then put through a very thorough quality assurance process to ensure our high-quality standards. All Next Gear software products are rigorously security tested through Veracode’s Application Security Program engine. All applications are scanned regularly using the Veracode engine to ensure that our applications meet or exceed Open Web Application Security Project (OWASP) best practices. This includes both a scan of the application code as well as the web application infrastructure. In addition, we have deployed Intruder vulnerability scanner to continuously scan infrastructure endpoints for over 9000 known vulnerabilities and growing. The Intruder system adds newly discovered v

ProAssist

No. Those will have to be done separately.

Yes. You can choose to send the ProAssist link to not only the individual labeled as a customer, but you can also send it to the Loss Contact. The ProAssist link can be sent to Property Managers or other external participants, as well.

This is because you have not allowed Location Services with the Next Gear Mobile  Application. You will need to uninstall/reinstall the app and then when you click “on the way,” make sure to allow.

Some cellular service carriers will split SMS messages due to character limits per message.

Yes. An invite can be sent to any contact in the Contact Manager so they can contribute to the job.

No. There is no limit to the amount of individuals you can invite to ProAssist.

Yes. With the BI reporting tool, reports can be built about the information that comes from ProAssist.

Product Support

CoreLogic Protect is committed to protecting the confidentiality, integrity, and availability our DASH, MICA, SettleAsist, MoistureMapper, and Luxor customers’ data.  We partner with World Class Data Center Providers that heavily invest in cyber security ensuring that our customer data resides in a highly secure environment. These data centers are independently audited and have attained the following world-wide recognized security framework and quality management certifications:

  • SOCS Type 2 1, 2, 3
  • ISO 27001:2013
  • HITRUST
  • ISO 9001:2015

These partners also enable us to deploy critical security systems including Azure Sentinel (SIEM), Azure Web Application Firewall and Azure Security Center to continuously protect, monitor and alert on security.  These Microsoft Azure systems continuously monitor infrastructure for anomalies using state-of-the-art machine learning. Finally, Next Gear also engages with industry leading security firms to conduct manual penetration and automated vulnerability scanning on our applications.

CoreLogic adheres to NIST framework security standards for all operational and development process security activities.  All applications have a well-define system development life cycle and change management process.  Our software is developed and then put through a very thorough quality assurance process to ensure our high-quality standards. All Next Gear software products are rigorously security tested through Veracode’s Application Security Program engine.  All applications are scanned regularly using the Veracode engine to ensure that our applications meet or exceed Open Web Application Security Project (OWASP) best practices. This includes both a scan of the application code as well as the web application infrastructure. In addition, we have deployed Intruder vulnerability scanner to continuously scan infrastructure endpoints for over 9000 known vulnerabilities and growing.  The Intruder system adds newly discovered vulnerabilities daily.

All scoped data is encrypted whether at-rest or in transit.  Next Gear uses AES256 encryption algorithm for data at-rest. This includes file storage as well as database data.  Data in transit is encrypted via secure RSA 2048 certificate using web TLS 1.2 and above. Next Gear encryption keys are securely managed via Azure Key Vault.

We employ a team of expert site reliability engineers and database administrators who are continually patching (every 30 days), performance tuning, and managing all Next Gear Solutions systems 24x7x365.  All scoped production systems are configured for threat and vulnerability monitoring and alerts are sent to this group for investigation of root cause.

Finally, we engage with third-party security vendor to conduct manual penetration testing on an annual basis.  All findings from the penetration test are investigated and remediated.  In addition we have engaged an external auditor and is working on obtaining SOC 2 Type II certification.  We anticipate that certification will be complete in Q4 of 2022 following a 9-month audit period.

Rest assured we take the security of our customers’ data very seriously.

Need technical support? Call us at (866) 769-7855. We’re available 24/7 for our valued customers.

We pride ourselves in a consultative approach to ensure your teams are realizing the value in the tools you’ve invested in. Whether its onboarding your existing team when you first sign on, hire new employees, or want on going training to become a power user, we are here to partner with along the way. Please visit our Training and Implementation page for specific details.

Schedule a consultation today to get started.

Request a Demo
linkedin sales solutions XosyhRSo unsplash

Need assistance or have any questions? Get in touch with us today!

Contact Us