Premium Audit Solutions
Management System for VendorsThe Nexus Management System™ Vendor Highlights:
-
The Nexus Management System™ is a web based solution, hosted in a professional data center and offered on a Software as a Service (SaaS) basis. This secure management system is fully integrated with the NEXUSAudit™ system for your staff auditors and can exchange data with your carrier partners to create a complete, turn-key solution.
-
Accepts intake feeds
- Nexus offers a standard xml intake feed structure that allows you to accept data from your carrier partners
- Open to accepting custom feeds from carrier systems
- Nexus offers reasonable custom programming fees
Allows for image file upload and data entry from any location
Automatic assigning to auditors or open territories based on pre-defined territories
Nexus PartnerSynch process allows for automatic data synchronization between Nexus Carriers and Nexus vendors
-
Automatic letter generation for voluntary and/or telephone audits
- Automatic attachment of forms based on policy type
-
Automatic matching of returned forms via fax to the appropriate audit record
- Uses the proprietary Nexus “Fax Match” System ™
- Saves matching time, especially on voluntary and phone audits
Integrates with NexusAudit ™ audit system
-
Reviewer interface
- pass and fail processes
- View audit, policy and attached forms on multiple screens
Automatic output generation and packaging
Automatic billing and invoicing
Customer portal to allow a vendor’s customers to view their inventory, request status, download/print completed work
Vendor portal to allow other vendors (hired by your company) to view their inventory, downloading new assignments and upload completed work
Dashboards to manage activity and processes in real time
Wide assortment of real time management reports
-
Produces output feeds
- Nexus offers a standard xml output feed structure
- Nexus open to creating custom feeds
- Feeds back to carrier systems
- Reasonable hourly customer programming rates
Ability to feed imaging systems
Role based security
Ability to customize