Remote wipe software built for IT peace of mind

Whether it’s a lost laptop or a terminated employee’s phone, Prey helps you protect company data instantly. Trigger remote wipe actions, lock devices, and track activity from a single, powerful dashboard.

Built for compliance, speed, and control at scale

Error message
Error message
Error message
Please select
Error message
Please select
Error message
Please select
Error message
Please select
Error message
Error message

Please submit a corporate email.

Stay compliant, even when devices go missing

Wipe devices clean and keep compliant

Lower the chance of a breach by quickly eliminating confidential data from compromised devices. Count on a complete security system, ready for a rainy day.

Remote wipe & factory reset

Wipe lost or compromised devices clean—instantly.Whether you need a full device wipe, factory reset, or a selective file removal.

Remote lock triggers

Lock devices remotely, and keep unauthorized users out—especially during travel, offboarding, or incidents.

Active location tracking

Know where your devices are—before you wipe them. Monitor assets in real time and set geofence triggers to automate remote lock actions if a device strays beyond safe zones.

Flexible licensing

Prey's flexible plans are built for IT teams managing remote or hybrid setups, with license reusability that adapts to your organization’s lifecycle.
NGO & EDU organizations apply for discounts.

Data wipe

Wipe your company's confidential information before it reaches the wrong hands. Great for remote devices left behind.

On computers

Deletes local documents from the device located in: Documents, Downloads, Desktop, Photos and Videos.
The selection of directories varies depending on the operating system.

On Android

The wipe action for Android phones enables you to format the SD card or reset the device to its Factory state.

On Apple devices

By enabling the MDM certificate on Prey, you can access the Factory Reset action for macOS devices.

File retrieval

Select and retrieve specific files and avoid losing time and work, even after the device is stolen.

Download or get an email

Browse your directories and recover files with direct download or send a link to your Prey account email.

Access SD cards

Prey can also access and retrieve files from external SD cards on mobile devices and tablets.

Remote encryption

Prevent breaches and unauthorized access with full disk encryption, by Windows Bitlocker.

Windows Bitlocker

Use Prey's Disk Encryption tool to remotely activate BitLocker on devices and protect data. It’s only available for Windows.

Kill switch

Kill Switch provides fast safety in case you lose a computer. Protect devices that carry information meant for your eyes only.

Disable disks

A quick defense emergency button. It will destroy the device's Master Boot Record, rendering the device unusable in minutes. It’s only available for Windows devices.

Factory reset

Wouldn't it be nice to have a solution to remotely remove all traces of previous use? Factory Reset allows just that, a blank slate to start over.

On Windows devices

Restore devices to factory settings. This irreversible feature formats your hard drive and reinstalls the OS. It could take up to an hour.

On Apple devices

Access Apple’s native Factory Reset functionality to completely restore macOS devices. A trust certificate from Prey is required.

An Extra Layer of Protection for Your fleet

No device left behind, quickly wipe and protect

A full location overview from anywhere

Stay in control with real-time location tracking. Access current and past locations of all devices from a single dashboard, ensuring you can locate and secure your assets instantly.

Remotely wipe, lock or encrypt compromised devices

Prevent data breaches by remotely wiping sensitive data from lost or stolen devices. Protect your data and hardware from unauthorized access while you work on recovery.

Automate security with location-based triggers

Take proactive action with automated geofence triggers. Set custom rules to instantly wipe or secure devices when they move outside approved locations, ensuring consistent data protection.

Monitor multi-user devices securely

Manage shared devices with ease. Set return dates, remotely wipe overdue devices, and ensure sensitive data remains protected without sacrificing user privacy.

See Prey in action

Step inside our interactive demo. See how Prey works—so you can evaluate if it's the right fit for your data security stack.

Prey is recognized as a

Leader and a
High Performer

in several industries

Securing devices for our customers for over 15 years

Set it and forget it device security.
"Quick to set up and easy to use. It adds a level of security that just lets me sleep at night."

Tim P.

Quality, reliability, and exceptional support.
"What I appreciate most is the consistency in meeting our needs."

Sara D.

Great tool for securing your devices.
"The interface is user-friendly and it just works. The team is always open to suggestions and will work to implement features we recommend."

Don H.

GPS Tracking made easy!
"Prey makes it easy to add (and remove) computers, tablets, mobile devices, etc to their MSP portal. Peace of mind for everyone."

Tara N.

Easy to use and it just works.
"Simple little install and then I can see all my devices in the dashboard. The support team is responsive."

Jasper T.

An affordable way to track and protect your devices.
"Easy to implement, lots of details on the devices being protected and a simple dashboard that we can use to find and manage our devices."

Bhairav P.

Set it and forget it device security.
"Quick to set up and easy to use. It adds a level of security that just lets me sleep at night."

Tim P.

Quality, reliability, and exceptional support.
"What I appreciate most is the consistency in meeting our needs."

Sara D.

Great tool for securing your devices.
"The interface is user-friendly and it just works. The team is always open to suggestions and will work to implement features we recommend."

Don H.

GPS Tracking made easy!
"Prey makes it easy to add (and remove) computers, tablets, mobile devices, etc to their MSP portal. Peace of mind for everyone."

Tara N.

Easy to use and it just works.
"Simple little install and then I can see all my devices in the dashboard. The support team is responsive."

Jasper T.

An affordable way to track and protect your devices.
"Easy to implement, lots of details on the devices being protected and a simple dashboard that we can use to find and manage our devices."

Bhairav P.

Our users said it best!

Take a look at some of our most loved capabilities as recognized by G2 and our users.

9.2/10

Ease of Use

A service that offers intuitive design, streamlined navigation and customizable features enabling users to accomplish tasks effortlessly.

9.6/10

Quality of Support

A prompt and knowledgeable assistance. Proactive outreach empowers users, making sure their needs are met efficiently and effectively.

9.6/10

Ease of Setup

With an intuitive onboarding and comprehensive guidance, the initial configuration is a streamlined process with minimal effort.