Maintain an Accounted Fleet

Have a thorough inventory of your device fleet, its hardware, status, and activity.

Enterprise Inventory

Hardware and OS

View each device’s hardware, operating system, and modifications carried out on these two.

User Contact Assignment

Keep a tab on the user that has been assigned to the device, and connect it to an institution.

Device Status

Check if the device is online or when it was last seen, see its active network, battery status, and which active user is currently logged in and using it.

CSV Data Export

Export your fleet’s complete data for review, presented in a formatted csv file right to your account’s email.

Get Prey Now
Optimize Your Asset Management

Deploy Prey in bulk and easily manage hundreds of devices by grouping and assigning them.

Mass Device Management

Scheduled Actions

Create time-based rules, or event-triggered actions to automate security and device management.

Labels and Search

Group your devices with custom labels, with a robust search engine that can filter by hardware, OS, user, and a lot more.

Mass Actions

Quickly schedule and deploy our lock, wipe, alert, and alarm features to multiple devices at once.

Quick Deployment

Silent and unattended installers for every OS, automatic updates, and custom APKs.

Get Prey Now
Detect Incidents Early

Stay on top of your device fleet’s security with custom risk detection alerts and information.

Risk Alerts and Status Dashboard

Fleet Status Dashboard

View your entire fleet’s activity globally with graphic insights regarding their movements, recent reports, demographics, and checked-in status.

Custom Risk Alerts

Configure Prey’s notification settings regarding Control Zone movement detection, missing device evidence reports, alerts for suspiciously offline devices, and more.

Activity Log

Review the device’s triggered events in the platform, hardware modifications, and connections.

Get Prey Now
Personalize the Platform to Your Needs

Access a platform that’s ready to adapt to your privacy policies and management needs.

Custom Configurations

Multi-user Accounts

Each report carries a map with nearby hot-spots, coordinates, and the pinpointed location of the device.

Feature Preferences

Prey’s tracking and security tools are customizable and can be turned off comply with an enterprise’s user privacy policies.

APNs MDM Compatible

Access further iOS and macOS management capabilities by linking your Prey account to an MDM certificate by Apple.

2FA

Set up an extra layer of security in your account by adding 2-factor authentication.

Get Prey Now
A Solution for Everyone.

Whether you’re looking to protect your own devices, or manage an enterprise fleet, Prey has a plan and platform for you.