Device tracking & protection on auto-pilot

Knowing where your assets are at any given time is now crucial. Avoid information loss within your remote workforce using Prey's persistent device tracking & security solution.

Get Prey

Trusted

Prey is trusted by millions of people, businesses, and institutions around the globe

A single solution

Choose the perfect plan for you

Individuals
PROTECT YOUR GADGETS AND PRIVACY
  • Watch over your gadgets with a single app
  • Guard your privacy from a stranger's eyes
  • Know when a device is out of its place
  • Aid the police in the recovery with evidence
Protect your personal device
Business
MONITOR ON-SITE OR REMOTE MOBILE FLEETS
  • Integrate thousands of multi OS devices with ease
  • Retrieve lost data and avoid corporate leaks
  • Organize, group, and control all devices online
  • Keep track of your remote workforce's fleet
Secure your fleet today
Education
MAXIMIZE LEARNING WITH ORGANIZED TEACHING ASSETS
  • Empower diverse fleets, multi-device and OS.
  • Manage laptop loans for students and faculty
  • Prioritize student privacy with opt-out tools
  • React in mass with remote security actions
Start managing now

What they say about us

Read More reviews
Installation is quick and easy, agent does not hog resources or interfere with the device.
With Prey, security of our loaned/remote devices brings certainty in uncertain times.
I'm able to organize my devices, see additional information about my devices. Support is responsive for the software.

Take a tour around Prey

Watch a Demo

Latest releases

What's New
Our new plans & solutions have arrived! | Feature Release

Prey’s new Tracking and Protection solutions are here, tailored just for you and your business’ needs.

Read more
What's New
New Data Protection Tools | Feature Release

Prey’s new Factory Reset & Kill Switch features come with data safety and ease of use in mind, letting you disable hard drives and restore devices remotely.

Read more

Transparency and privacy

Prey is an Open-Source platform that prioritizes the clean and private handling of user data