 
				What’s new in Clue – Advancing investigations with Gadget 2.2
 
					Our latest Clued-up community session brought together investigation professionals from across sectors to explore Gadget 2.2 – the newest Clue software release.
Better scheduling, smoother workflows
One of the standout enhancements in Gadget 2.2 is the overhaul of case scheduling. Users can now more easily manage classifications and continuation schedules for exhibits and witness lists, helping keep records clear and accurate as cases evolve. These changes remove common pain points around reclassified items and give investigators better visibility over where materials have appeared in schedules – supporting consistent, transparent case management.
Stronger integrations with more secure APIs
Connectivity is at the heart of many modern investigations. Gadget 2.2 introduces new API capabilities that make it easier and more secure to connect Clue with other applications. These include improved authentication methods, new filtering options, and clearer error messaging. Together, these changes help data flow more efficiently between systems while maintaining strong security standards.
More ways to tailor Clue to your team
We’ve also extended custom field options, allowing teams to add drop-down lists of their own internal groups. This gives organisations more flexibility to reflect their unique structures within Clue – whether assigning responsibilities or tracking ownership across teams.
Community at the centre
As always, these improvements were shaped by feedback from Clue users through our Ideas Portal and community discussions. Clued-up sessions give users the chance to see new features in action, ask questions directly to our product team, and share how they’re tackling similar challenges.
Gadget 2.2 is another step forward in supporting investigations that are efficient, collaborative, and secure.
Interested in being part of this community, or want to explore how Clue can support your team’s work? Get in touch – we’d love to talk.
Related Resources

 
				What's behind the rising insider risk and why does traditional security no longer suffice? Our latest Threat Assessment outlines an intelligence-led approach to detection and prevention, from national security breaches to ransomware.