ANTI THEFT & MOBILE SECURITY

The mobile device suite:

Never lose sight of your devices, recover and protect stolen data, and make sure your fleet stays manageable, no matter if it is on site, or out for remote work.

Tracking & Location

Always know where

Track the whereabouts of laptops, tablets and mobiles, and make sure those that shouldn't be taken off site stay in their place with Geofences that alert exits or entries.

location PREFERENCES

Actve tracking is Prey's default setting. It gathers locations when devices move, and in timed checks. If Active is disabled, you will have to locate by request.

Geofences

Instantly know if a device leaves a designated area, or if it goes somewhere unsafe. Create geographic or radius safe perimeters to better monitor devices.

triangulation TRACKING BY GPS, WIFI & GEOIP

The GPS isn't active? Not an issue, we can triangulate it.

GLOBAL DEVICE VIEW

Easily see your entire fleet's location at once with the global map view.

LOCATION HISTORY

Check for suspicious past positions, or find patterns when looking for a lost device.

Device Security

React, lock, alert

When a device is lost and out of your reach, react with security actions to protect and recover your organization's assets, avoiding anyone from accessing it.

SCREEN LOCK

No stranger's hands will access your phone, tablet, or laptop if you remotely lock it.

MESSAGE ALERT

Not all losses are theft, and not everyone's a thief. Try contacting the current device holder.

remote ALARM

Your device will make a 30-second racket that can't be silenced to help you locate it.

GEOFENCE-TRIGGERED ACTIONS

Configure automatic actions, like the lock, alarm, and alert, for when a device enters or exits a specific Geofence.

Data protection

Care about data

Protect your own, and your organization's data with a set of data protection tools that's ready to wipe confidential information and usage data, or retrieve specific files.

custom WIPE*

Delete cookies, email data, documents, local cloud storage files, and custom directories on lost devices.
*Directory selection varies depending on the OS.

FILE RETRIEVAL

Select and retrieve specific files and avoid losing your work even after the device was stolen.

remote encryption[win]

Activate Windows' full disk encryption tool remotely, BitLocker, to protect data, prevent filtrations, and meet security standards.

kill switch[win]

Press this emergency button for a quick defense. It will destroy the device's Master Boot Record, rendering the device unusable in a matter of minutes.

factory reset[win]

This feature remotely restores the device down to factory settings, removing all traces of use from the computer. It’s irreversible, it formats your hard drive and installs the OS all over again. It could take up to an hour.

Device Management

Control and perform

Manage fleets of any size and type. Handle laptops, tablets, mobiles. In the office or remote. You can automate swiftly locate, their security, and organize them in bulk.

automations

Program recurrent, repeating, or one-time actions to streamline daily tasks, such as a curfew lock.

MASS ACTIONS

Quickly schedule and deploy our lock, wipe, alert, and alarm features to multiple devices.

ENTERPRISE INVENTORY

Keep track and secure device loans, assign permanent users, see hardware changes, and maintain a record of all account activity for visibility.

LABELS AND SEARCH

Manage your devices with custom labels, with a robust search engine that can filter by hardware, OS, user, and a lot more. Use filters to create device Groups.

FLEET STATUS DASHBOARD

View your entire fleet's activity globally with graphic insights regarding their movements, recent reports, demographics, and checked-in status.

CUSTOM DEPLOYMENTS

Silent and unattended installers for every OS, automatic updates, and custom APKs.

DEVELOPER API

Consume data from your account, develop integrations with third-party platforms, and trigger changes/actions.

roles and permissions

Create roles, groups and users, customize their permissions and edit them according to your preferences.

Missing Reports

Recover with evidence

The recovery begins when you mark a device as missing in the panel. The Evidence Reports will activate and deliver crucial evidence for the police, in custom time-frequencies.

Picture and screenshots
Active and nearby
wi-fi
Coordinates and map
Device information
Mac Address and IP
Prey is trusted by millions of people, organizations and institutions around the globe

What they say about us

Read More reviews
"With Prey we are able to know the exact location of our devices and if they are compromised we can delete all the files remotely."
"The ability to locate, lock, recover or wipe a protected device brings some peace of mind in such a climate."
"Prey is the most complete mobile application for locating our devices. Simple but very powerful and useful."