You've found the Device Tracking & Security tool to stay in control of your remote assets and their data.
Join Prey’s KAM Rafael in a live journey through our Business and Education product. Explore Inventory Management and Location Tracking features, as well as our set of Security Actions.
In this episode you will learn to; set up Control Zone geofences and triggers actions, set up Automated Actions for your devices, check your devices' location in group and individually, and see your devices’ Location History.
Learn to; supervise your account’s usage and stay audit-ready with Audit Log, control actions taken in your devices using Activity Log, get an overview of your devices with the CSV export, and customize your experience with Developer’s API.
We will show you how to; check your devices’ global insights with the Status Dashboard graphs, deploy Prey with Unattended Install from your account, and use Automated Actions based on time or events.
We will go over these topics; loaning devices with Loan Manager and setting up rules for other users, remotely displaying an Alert Message to assets in your account, and ringing a Remote Alarm to a selected device.
This demo tours goes though; remote Wipe of drives or files across platforms, executing a Factory Resets, quickly making your laptop unusable with Kill Switch, Disk Encryption using Bitlocker, and using Screen Lock to make a device inacessible.
Get the best experience with Prey with a few simple tips!
Learn safe practices for tracking, save time on account management, and manage Missing Reports in an efficient way.
It's a cybersecurity solution that manages and protects remote devices. Install Prey, add devices and control everything from your account as long as the device(s) connects with our servers.
Prey for iOS and Android tracks using the device's GPS receptor. When it comes to Windows, MacOS, Chrome OS and Ubuntu, it uses Wi-Fi positioning. Prey will triangulate where your computer most probably is based on an existing database.
I'm sorry to say we can only act on devices linked to a user account, and the only way of doing this is configuring Prey manually. We can only help what we have already met, so protect your devices before stuff happens.
Prey helps you locate and perform actions on your devices such as alarms, messages, screen lock, among others. If a device is lost or stolen, you can mark it as Missing and it will send back reports including location, pictures and screenshots (on laptops only), as long as the device is online. Learn more here.
It could mean many things. It may be that your device has no GPS; there we rely only on Wi-Fi. If your device has neither, there is still some hope, but you may need extra steps or adapters. Please read this article for Wrong Locations and Troubleshooting.
For more information such as installation, features, configurations, recommendations, uninstallation, preventing uninstallation, and more, please visit our Help Center or contact our sales team!