Locate and track devices, get notifications and block screens when they're due for return or get lost


IT Admins: Peace of mind is just a click away!

OUR OVERALL REVIEW IN G2:

This is how we protect 70,000+ school devices across the US

REDUCING TIME BY AUTOMATING DEVICE CONTROL TASKS

Automate alarms, messages and screen locks. Make sure you get your devices back!

Complying WITH   FERPA AND CIPA USING WIPE AND ENCRYPTION

Manage security standards to protect student personal data and prevent unauthorized access.

PROTECTING YOUR DEVICES NO MATTER WHERE THEY ARE

Locate and track lost devices. Create safe perimeters to protect machines and users.

GETTING REPORTS AND NOTIFICATIONS TO TAKE ACTION

Monitor devices, send messages and get notified of important movements to keep track.

Watch our quick Product Tour in minutes

Find school devices anytime
Reset a laptop fast by automating data wipe
Assign users, return dates and lock actions for overdue devices
14+ years

Founded in 2009, Prey keeps going strong!

70K+

Education Devices Protected in the US

8,9 M+

Protected Devices across the Globe

93.3%

Customer satisfaction in support interactions

Check out what customers say about us

What’s really neat about Prey is I can drill down so far on the map of the school on my computer screen that I can see what part of the building the missing MacBook is sitting in. And when I check, most likely it’s there.

Eric Vrieling, Toronto District Christian High School

Previously, I might have maintained an offline Excel list to track which laptops were loaned out and to whom. Having the Device Lending feature integrated directly into Prey turned out to be unexpectedly convenient and streamlined our device management process significantly.

Michael Jacobs, Holy Ghost Preparatory School

LEARN FROM REAL USERS!

Success Story compilation.

Download
Please enter a valid business email address

Check technical and commercial information about Prey for Schools

PRODUCT DETAILS

Get full detail on Prey’s offer for Schools

DOWNLOAD

FEATURE LIST BY PLAN

Compare features among Prey’s different plans

DOWNLOAD

Top reasons why schools prefer Prey

Affordability:

Prey's cost-effectiveness is a major advantage, providing significant savings over conventional insurance and warranty options.

Ease of Installation and Training:

The straightforward installation process and minimal training requirements ensure that the school can quickly deploy and utilize Prey without extensive IT expertise.

Remote Messages:

Used for communication with students regarding device returns and updates.

Got more questions?

For a more personalized Q&A session, let’s get in touch!

FAQ

How does Prey work?

Prey allows you to efficiently Monitor, Secure, and Manage your remote devices, offering actions like screen locking and status updates for lost devices. It supports major operating systems like Windows, macOS, ChromeOS, Ubuntu, iOS, and Android, and works smoothly with computers, tablets, and smartphones.

How does Prey protect my privacy?

We only request the minimum amount of data to create your account, this includes your name and country; however, it is important to highlight that the only way for us to identify you as a user is through the e-mail you used to register, which will be the official channel of communication between us. Under GDPR, the basis for our data processing is service provision. Read more in our Terms of Service.

Is my Data safe with Prey?

Always! Your security and privacy are our priority. We adhere to the highest privacy standard by complying with the European General Data Protection Regulation (GDPR). Learn more here.

¿What are Prey’s additional security protocols?
  • Two-Factor Verification: Prey supports this protocol to increase your account's security by using a unique, randomly generated security code in addition to your password.
  • SAML & SSO: Prey supports this protocol that allows identity providers (IdPs) to pass login credentials to Prey (your service provider).
  • SSL: Prey is SSL certified, making SSL/TLS encryption possible.
The Security Challenges of K-12 IT Directors
Please enter a valid business email address
Developing a cybersecurity strategy for K12
Please enter a valid business email address