Manage computers for security, theft, and monitoring

The laptop tracking software that protects on and off network

Remotely track, lock, and manage multiple devices with features like geofencing, remote lock and device wipe. Made for business!

Error message
Error message
Error message
Please select
Error message
Please select
Error message
Please select
Error message
Please select
Error message
Error message

Please submit a corporate email.

Keep an eye on your remote device fleet with Prey

Track all device movements, react to unwanted ones and prevent any potential security risks taking quick action.

Real-time persistent location tracking

Track your devices accurately with GPS, IP or Wifi tracking to ensure that the devices are being used in the intended manner and location.

Look back in time

Look back into a device's historic movements, and enable periodic reports to detect odd patterns and identify possible suspect locations.

Remote Security actions

Lock, wipe, or encrypt remotely with just a few clicks. Secure data effortlessly and prevent leaks and risks.

Detect unwanted movements and react

Create geofencing areas on a map and receive alerts when your devices move in or out of them. Set up an automatic action trigger and prepare for success!

Active tracking

An always-on laptop tracking software for business, providing precision without compromising battery life.

Smart monitoring

Prey's persistent tracking setting gathers new locations whenever it detects movement. If disabled, the function changes to on-demand.

GPS plus Wi-Fi triangulation

The platform combines tracking methods. It will use results from GPS for mobiles, and Wi-Fi triangulation for laptops and desktops.

Global device view

View your device's location individually or keep an eye on all of them at once using the global map view.

Geofences

Create safe perimeters on the map, assign devices to the geofences, and get alerts to react if needed.

Create Radius, Geographic and Custom fences

Choose between creating safe radius geofences for devices or delimit devices to a country, city or state. You can also create custom shapes! Whatever makes more sense for your organization.

Movement detection

Delimit areas where devices belong, or where they should/ shouldn't move through and detect entries and exits.

Automatic reactions

Configure automatic security actions when a device moves in or out of a Geofence. Lock a device or mark it as missing.

Customize actions

Set up alarms, messages and a actions that will be activated when you devices make unexpected moves.

Set up notifications

Instantly get email notifications when your parameters are triggered.

Location history

Look back up to a month of registered locations to detect odd patterns. Identify possible suspicious actions and device misuse.

Record days and hours

Register addresses, with time and date stamps. Each day shows the locations detected (if any) in chronological order.

Map activity

Device movements include map markings. Click the pins to see the addresses (or the addresses to see the pins).

Get a CSV file

Receive a CSV file in your inbox to get a record of your device's movements and behavior.

Missing reports

Stolen or missing device?. The path to recovery begins when you mark a device as missing in the panel. Missing Reports will activate and gather crucial evidence.

Location information

Each report shows a map with nearby hot spots, coordinates, and the pinpointed location of the device. Plus WiFi connections close by.

Photos and screenshots*

Add front (and back) camera pictures and a screenshot to your reports to help you identify the user. Or don't, this is an opt-in feature*.

Device and user information

Gather IP, MAC address, serial number, and hardware information. Plus, you see what user is currently logged in.

An Extra Layer of Protection for Your fleet

More than a solid tracking tool

A full location overview from anywhere

Always keep a registry of the locations of your phones, tablets and laptops. Check their current and past locations from one dashboard that is easy to use and accesible from any web browser.

Remotely lock, wipe or encrypt compromised devices

Ensure device loss doesn’t escalate to a data breach. Protect your data and hardware from unwanted access while you work on its recovery.

Set automatic location triggers

Take action using your fleet's positioning information and plan for defense without future actions on your part. Just create a Geofence, choose your triggers and go about your day!

Easily watch multi-user devices while protecting their privacy

If you have laptops that are being loaned to different users, you can assign them and stay informed of their status and return date. Lock overdue devices and alert both user and admin when time's up.

See how Prey handles laptop tracking

Step inside our interactive demo and experience how Prey helps IT teams locate, lock, and recover stolen laptops—without delay or complexity.

Prey is recognized as a

leader

in several industries

Securing devices for our customers for over 15 years

Set it and forget it device security.
"Quick to set up and easy to use. It adds a level of security that just lets me sleep at night."

Tim P.

Quality, reliability, and exceptional support.
"What I appreciate most is the consistency in meeting our needs."

Sara D.

Great tool for securing your devices.
"The interface is user-friendly and it just works. The team is always open to suggestions and will work to implement features we recommend."

Don H.

GPS Tracking made easy!
"Prey makes it easy to add (and remove) computers, tablets, mobile devices, etc to their MSP portal. Peace of mind for everyone."

Tara N.

Easy to use and it just works.
"Simple little install and then I can see all my devices in the dashboard. The support team is responsive."

Jasper T.

An affordable way to track and protect your devices.
"Easy to implement, lots of details on the devices being protected and a simple dashboard that we can use to find and manage our devices."

Bhairav P.

Set it and forget it device security.
"Quick to set up and easy to use. It adds a level of security that just lets me sleep at night."

Tim P.

Quality, reliability, and exceptional support.
"What I appreciate most is the consistency in meeting our needs."

Sara D.

Great tool for securing your devices.
"The interface is user-friendly and it just works. The team is always open to suggestions and will work to implement features we recommend."

Don H.

GPS Tracking made easy!
"Prey makes it easy to add (and remove) computers, tablets, mobile devices, etc to their MSP portal. Peace of mind for everyone."

Tara N.

Easy to use and it just works.
"Simple little install and then I can see all my devices in the dashboard. The support team is responsive."

Jasper T.

An affordable way to track and protect your devices.
"Easy to implement, lots of details on the devices being protected and a simple dashboard that we can use to find and manage our devices."

Bhairav P.

Our users said it best!

Take a look at some of our most loved capabilities as recognized by G2 and our users.

9.2/10

Ease of Use

A service that offers intuitive design, streamlined navigation and customizable features enabling users to accomplish tasks effortlessly.

9.6/10

Quality of Support

A prompt and knowledgeable assistance. Proactive outreach empowers users, making sure their needs are met efficiently and effectively.

9.6/10

Ease of Setup

With an intuitive onboarding and comprehensive guidance, the initial configuration is a streamlined process with minimal effort.