call us 855-636-5361

case management software

Government Investigative Agencies Blog

Blog

  1. On-Premise vs Cloud: A Comprehensive Guide to Making the Right Hosting Choice for Your Agency

    Cloud hosting and on-premise servers are two different ways to host your website or, in the case of CMTS, application. Cloud hosting means your website or application is hosted on remote servers owned and operated by a cloud hosting provider. On-premise servers suggest that your website or application is hosted on servers you own and use in…

  2. Microsoft vs CMTS

    Are you tired of struggling with spreadsheets? While Microsoft Excel and Access can be a fantastic solution for various situations, understanding when it’s time to level up becomes crucial in maintaining optimal operational efficiency. Join us as we delve into a powerful solution that liberates you from the limitations of Microsoft and identifies the telltale…

  3. Salesforce vs CMTS

    The right case management system can make or break an investigative team’s ability to handle complex cases, track vital information, and collaborate seamlessly. As agencies grow and streamline a more robust solution is often required. When choosing a case management system, major concerns include configurability, ease-of-use, security, and price. To better understand how CMTS compares…

  4. CMTS Achieves StateRAMP Moderate Baseline

    WingSwept’s Case Management and Tracking System (CMTS) was authorized by StateRAMP Moderate Baseline, which is built on the National Institute of Standards and Technology Special Publication. WingSwept not only strives to ensure that CMTS is the best solution for agencies, but also that it has the easiest procurement path of any case management solution. What…

  5. WingSwept Attends 2022 Association of Inspectors General Annual Training Conference

    WingSwept will once again be an exhibitor at the 2022 Association of Inspectors General Annual Training Conference in Washington, DC.  Our case management solution, CMTS, was originally designed for the Inspector General community, and we look forward to any opportunity to highlight how the software can help oversee and manage fraud, waste, and abuse.  This…

  6. WingSwept- Case Management & Tracking System (CMTS) Achieves FedRAMP® Moderate Baseline

    Garner, NC – IT services firm WingSwept, LLC is pleased to announce that the Case Management and Tracking System (CMTS) has been authorized under the Federal Risk and Authorization Management Program (FedRAMP®) Moderate Baseline, a standard set of security requirements for cloud services. This is exciting news for the company as WingSwept has provided secure…

  7. Do These 3 Things Before Choosing Case Management Software

    You might have heard the phrase “It’s not a bug, it’s a feature!” – well, the first software bug was definitely not a feature. An unexplained error kept appearing during genius engineer Grace Hopper’s work designing the Mark II computer in 1947.  After careful study, fellow engineers finally found the source – a moth was…

  8. Don’t Allow Your Investigative Agency to Become a Political Football

    One of the rare opportunities that investigators have to shine a light on their important work is when they present summaries of their agency’s work to legislative committees.  The politicians sitting on these committees often take these opportunities to applaud the waste and fraud uncovered by investigators.  Most investigators aren’t attention seekers by nature.  But…

  9. Your Investigators Are Impartial. Your Case Management System Can Help You Prove It.

    Investigative teams need to be viewed as fair and impartial, both to retain their credibility and to continue receiving tips.  Every subject and complainant is entitled to the same level of diligence from your team, no matter their position or seniority.  Subjects are also legally protected from being treated differently because of demographic factors including…

  10. Cybersecurity: More Ways to Protect Your Team

    This post is a continuation of “Cybersecurity: Don’t Wait, You Might Be Next!“, which outlines the new cybersecurity risks facing investigative agencies and provides ways they can insulate themselves from the loss or leakage of highly privileged information. #3 – Protect User Credentials Password requirements have gotten more complex over the years.  There’s a good…