Flexible and friendly prices for
everyone!
Chances are, we have a plan that fits your needs and budget, without big compromises.
Prey
Free
- Geolocation tracking
- Hardware Information
- Screen Lock
- Alert Message
- Remote Alarm
- Set as missing/recovered
- Up to 20 Missing reports
- 24-hour Device Activity Log
Prey
Starter
- Enhanced Location services, more accuracy, more security!
- Missing reports are automatically overwritten when the maximum limit is reached. Star reports to save them
- Special discount for yearly subscriptions
Prices exclude any applicable taxes.
Available features may vary according to operating systems.
Compare all products & features.
Breach Monitoring
A complete dark web monitoring system guarding your company's data 24/7

Identify your email & domain exposure on the Dark Web
Understand the scope of your data compromises: Credentials, financials, personal details, and more
Understand how your security protocols stand up against real-world Dark Web threats
Stop minor leaks before they become catastrophic breaches
Compare all Features
1 device slot
5 device slots
Geolocation Tracking | Limited accuracy | Enhanced accuracy |
Hardware Information | ||
Activity Log | (24 hours) | (24 hours) |
Hardware Changes |
Mark as Missing/ Recovered | ||
Missing Reports | 20 fixed report slots. Users must delete old reports to allow for new ones. | 20 report slots that self-rewrite. Users can star reports to keep them. |
Report Frequency | Every 10 or 20 minutes | Every 10 or 20 minutes |
Front and Back Silent Camera Pictures (opt-in) | ||
Screenshot (opt-in) |
Screen Lock | ||
Remote Alarm | ||
Alert Message |
Prey
Tracking
- Missing Reports
- Geofences
- Screen Lock
- Alarm
- Alert
Prey
Protection
- Geofence Actions
- Custom Wipe
- Factory Reset
- Remote Encryption
Prey
Full Suite
- Mass Actions
- Audit Log
- Device Loan Manager
- Automations
- 24/7 priority support
Prices exclude any applicable taxes.
Available features may vary according to operating systems.
Compare all products & features.
Breach Monitoring
A complete dark web monitoring system guarding your company's data 24/7

Identify your email & domain exposure on the Dark Web
Understand the scope of your data compromises: Credentials, financials, personal details, and more
Understand how your security protocols stand up against real-world Dark Web threats
Stop minor leaks before they become catastrophic breaches
Talk to an expert!
Compare all Features
Starting at
Starting at
Starting at
Geolocation Tracking | |||
Hardware Information | |||
Activity Log | (1 month) | (1 month) | (1 month) |
Location History | (1 month) | (1 month) | (1 month) |
Hardware Changes | |||
Radius Geofences | |||
Geographic division Geofences | |||
Custom Geofences | |||
Geofence Alerts | (Unlimited) | (Unlimited) | (Unlimited) |
Geofences Actions |
Mark as Missing/ Recovered | |||
Missing Reports Once the limit number is reached, new reports start to overwrite older ones. Reports may be starred in your panel to keep them from disappearing. | (Up to 100) | ||
Report Frequency | Every 2, 5, 10 or 20 minutes | Every 2, 5, 10 or 20 minutes | Every 2, 5, 10 or 20 minutes |
Front and Back Silent Camera Pictures (opt-in) | |||
Screenshot (opt-in) |
Screen Lock | |||
Remote Alarm | |||
Alert Message | |||
Custom Wipe | |||
File Retrieval | |||
Remote Encryption | |||
Clear Passcode | |||
Factory Reset | |||
Kill Switch |
Multi-user Accounts | |||
Global Management Panel | |||
Fleet Status Dashboard | |||
Email Notifications | |||
Groups and Labels | |||
Users, Roles and Permissions | |||
Device Connectivity Tracking | |||
User Contact Assignment | |||
Advanced Search | |||
CSV Data Exports | |||
Developer API | |||
Unattended Installation | |||
Two Factor Verification | |||
SSO/ SAML | |||
Custom Fields | |||
Loan Manager | |||
Mass Actions | |||
Audit Log |
Event-based Automations | |||
One-time Automations | |||
Time-frame Automations |
Reusable Licensing | |||
Flexible Plan Upgrade | |||
Customer Success Management | |||
Priority Support |
Prey
Custom
- Choose the most relevant features for your budget and use cases
- Work with an expert to tailor your experience and get fitted recommendations
- Pay only for the features that you select
- Have a little bit of everything: Monitor, Protect and Track devices
Prey for
Chromebooks
- Make the most out of your budget so you can protect your entry-level devices
- Work from Google Admin Console and get the features from Google and Prey!
- Upgrade or downgrade your device slots and easily reuse your licenses
- Access Priority Support from the get go
Available features may vary according to operating systems.
Compare all products & features.
Breach Monitoring
A complete dark web monitoring system guarding your company's data 24/7

Identify your email & domain exposure on the Dark Web
Understand the scope of your data compromises: Credentials, financials, personal details, and more
Understand how your security protocols stand up against real-world Dark Web threats
Stop minor leaks before they become catastrophic breaches
Read about Prey for Education users
"With Prey, we can lock down devices, set loan timelines, and even recover equipment that’s gone missing. It gives us the control we need, and it’s incredibly easy to use."
Director of Service Delivery, Rock Valley College
“Prey has been instrumental in ensuring the return and security of our equipment. In instances of misplaced devices, its tracking capability offers a rough location, such as identifying a device is in Building B, enabling us to swiftly locate and secure it.”
IT Support Coordinator, Salina Area Technical College
“If a teacher's laptop is lost, stolen, or subjected to any other issue, we have Prey as a resource to assist in retrieving the device, wiping the drive, or locking the user out, among other features that Prey provides.”
Director of IT, The Holy Ghost Preparatory School
Compare all Features
All available features for
All available features for
Geolocation Tracking | ||
Hardware Information | ||
Activity Log | (1 month) | (1 month) |
Location History | (1 month) | |
Hardware Changes | ||
Radius Geofences | ||
Geographic division Geofences | ||
Custom Geofences | ||
Geofence Alerts | (Unlimited) | (Unlimited) |
Geofences Actions |
Mark as Missing/ Recovered | ||
Missing Reports Once the limit number is reached, new reports start to overwrite older ones. Reports may be starred in your panel to keep them from disappearing. | (Up to 100) | |
Report Frequency | Every 2, 5, 10 or 20 minutes | Every 2, 5, 10 or 20 minutes |
Front and Back Silent Camera Pictures (opt-in) | ||
Screenshot (opt-in) |
Screen Lock | ||
Remote Alarm | ||
Alert Message | ||
Custom Wipe | Users and data | |
File Retrieval | ||
Remote Encryption | ||
Clear Passcode | ||
Factory Reset | Using Google Admin Console | |
Kill Switch |
Multi-user Accounts | ||
Global Management Panel | ||
Fleet Status Dashboard | ||
Email Notifications | ||
Groups and Labels | ||
Users, Roles and Permissions | ||
Device Connectivity Tracking | ||
User Contact Assignment | ||
Advanced Search | ||
CSV Data Exports | ||
Developer API | ||
Unattended Installation | ||
Two Factor Verification | ||
SSO/ SAML | ||
Custom Fields | ||
Loan Manager | ||
Mass Actions | ||
Audit Log |
Event-based Automations | ||
One-time Automations | ||
Time-frame Automations |
Reusable Licensing | ||
Flexible Plan Upgrade | ||
Customer Success Management | ||
Priority Support |
Our users said it best!
Take a look at some of our most loved capabilities as recognized by G2 and our users.
Ease of Use
A service that offers intuitive design, streamlined navigation and customizable features enabling users to accomplish tasks effortlessly.
Quality of Support
A prompt and knowledgeable assistance. Proactive outreach empowers users, making sure their needs are met efficiently and effectively.
Ease of Setup
With an intuitive onboarding and comprehensive guidance, the initial configuration is a streamlined process with minimal effort.
Prey is recognized as a
leader
in several industries
Frequently asked questions
A slot represents one space for a device so you protect it under your account. You will be charged for each slot, assigned or not to a device. They are flexible, you may upgrade and downgrade as you wish.
Device slots that are assigned may be liberated and reused at any time. When a device is deleted the slot will become available to be used again.
Tracking, Protection and Full Suite, our Organization Plans, don’t require a minimum slot purchase, you decide how many devices you need to protect. Price per slot decreases as you increase your total, past the 50 slot mark.
We accept credit cards, PayPal, Wire Transfer, and ACH* at this time. Checks are not accepted. Purchase orders will be requested if you're a business in the US and selected countries (*USA only).
The published prices do not include any applicable taxes. These additional charges vary greatly by country and will be disclosed before your final payment confirmation.
Yes! We offer a 14-day free trial with 100 slots to let you test drive Prey. Any Organization Plan of your choosing. You are welcome to purchase the plan you prefer directly from the Panel during your trial period.
Every user gets a price reduction for choosing a two year billing cycle. Additionally, Non-profit, NGO and educational organizations are eligible for an extra discount on their plan subscription. Request a quote.
We currently work with Managed Service Providers and Resellers. Follow the links to learn more about them and find out which one best adapts to your business model.
In case you have additional doubts or want to inquire about your purchase process, please contact our Sales team at sales at preyproject dot com.