The utility belt for both the individual anti-theft hero, and the business.

Never lose sight of your devices, turn stolen data into reachable files, and make sure your fleet stays neat and manageable at all times.

Using Prey 101

  1. Install Prey on all devices, signup with a single account

  2. Watch over by logging to the website’s Online Panel

  3. React to Theft, mark MISSING devices to get evidence reports

  4. Counterattack,and use our actions: lock, wipe, alarm, alert

  5. Recover your devices with the police and trap the culprit


What to do in case of theft?

Tracking & Location

Always Know Where

Stay tuned to the whereabouts of all your phones, laptops, and tablets, and setup Control Zones to receive alerts when a device enters or leaves its assigned area

Tracking Preferences

Active tracking with movement detection and periodic checks, or on-demand locations.

Control Zones Geofencing

Instantly know if a device leaves it’s defined area, or if it goes somewhere unsafe.

Tracking by GPS, Wifi Triangulation, GeoIP

The GPS isn’t active? Not an issue, we can triangulate it.

Global Device Viewsoon™

Keep an eye on all your devices’ whereabouts with a glimpse at your panel.

Location Historysoon™

Check for suspicious past positions, or find patterns when looking for a lost device.

Remote Screen Lock

No stranger’s hands will access your phone, tablet, or laptop if you remotely lock it.

Message Alert

Not all losses are theft, and not everyone’s a thief, try contacting the current device holder.

Anti-mute Alarm

Your device will make a 30-second racket that can’t be silenced to help you locate it.

Device Security

React, Lock, Alert

Choose your reaction depending on the case. Lost phone nearby? Ring an alarm. Work laptop stolen? Remotely lock it. Send messages if necessary, not all losses are thef

Data Security

Care About Data

Upgraded accounts get extra tools to keep their privacy, well, private. Whether they are documents, custom directories, or user data, wipe it clean or retrieve it to keep it private.

Remote Wipe

Don’t hand over your personal files and work to whoever took your device, delete it.

File Retrieval

Losing a device doesn’t have to mean you lose work or private files, select and retrieve

Mass Actions

Quickly schedule and deploy our lock, wipe, alert, and alarm features to multiple devices.

Customized Labels

Silent, mass, and unattended installers for all our supported operating systems, plus automatic updates

Advanced Search

Find the needle in your thousand-device-haystack with our robust search engine

Enterprise Panel

A business panel that’s ready to house huge fleets, making their management easy

Custom APK Deployments

Launch our solution to your fleet massively with custom APKs and installers

Enterprise Solutions

Guard Businesses [Pro]

Enterprise device security and management. Administer fleets of any size, secure their data, and manage them in mass by organizing and launching bulk actions.

KNOW OUR BUSINESS SOLUTION

Missing Reports

Recover With Evidence

The recovery begins when you mark a device as missing in the panel. The Evidence Reports will activate and deliver crucial evidence for the police, in custom time-frequencies.

Pictures and screenshots

Active and nearby Wi-Fi

Coordinates and map

Device Information

Mac Address and IP

Anti-Theft meant for everyone

Trusted by millions of people and worldwide businesses alike.

+7,136,934Awesome Security Heroes

+8,852,602Cool gadgets safe and sound

+230Countries covered

What they say about us

Read More Stories
UGANDA

Identified and trapped a thief who had knocked him out to rob him.

Read story