Track the location of laptops, phones, and tablets, and ensure you can quickly react to unauthorized movements with geofencing.
Prey's configurable tracking provides multiple-location methods for better accuracy and reliability, without compromising the battery of the device.
Prey's tracking is always active by default. It gathers locations when devices move, and in timed checks. The Active status can be disabled so you can locate devices by request only.
The platform uses combined tracking methods, choosing the most accurate and reliable result from GPS and WiFI triangulation to locate your phone, laptop or tablet.
View your device's location individually, or keep an eye on all of them at once using the global view.
Create geofencing areas on a map that alert the movement of devices, like those who shouldn't leave the office, and then react automatically.
Choose areas where devices belong, either a Radius zone within your city or country, or a Geographical division like a city, state or country.
Configure each Geofence with different reactive security actions that activate when a device moves in or out of them.
Instantly know when a device moves, triggering setup detection rules of its assigned Geofence.
Assign devices to Geofences that are relevant to their movement, and create location rules.
Look back up to a month of registered locations to detect odd patterns. Identify possible suspect addresses, and thereby, device misuse.
The registered locations have date and time stamps. Every day showcases the addresses detected (if any) and map pins to better locate your devices. See also: calendar view!
See the map markings to get a sense of the device's movements. Click the pins to see the exact addresses (or click the addresses to see the pins).
Receive a CSV file in your inbox to get a record of your device's movements and behavior.
The recovery begins when you mark a device as missing in the panel. The Evidence Reports will activate and deliver crucial evidence for the police, in custom time-frequencies.
Each report carries a map with nearby hot-spots, coordinates, and the pinpointed location of the device.
View a list of active and nearby WiFi connections close to the missing device for better location identification.
When available, the report will also bring a front and back camera picture to help you identify the perpetrator and place, as well as a screenshot.
Make sure you can identify your device with its IP, MAC address, serial number, and hardware information. Plus, you see what user is currently logged in.