Flexible and friendly prices for
everyone!

Chances are, we have a plan that fits your needs and budget, without big compromises.

Prey
Free

Lightweight version for 1 device
No charges!
  • Geolocation tracking
  • Hardware Information
  • Screen Lock
  • Alert Message
  • Remote Alarm
  • Set as missing/recovered
  • Up to 20 Missing reports
  • 24-hour Device Activity Log

Prey
Starter

Essential features for 5 device slots
$
2.99
/month
Everything in Free, plus:
  • Enhanced Location services, more accuracy, more security!
  • Missing reports are automatically overwritten when the maximum limit is reached. Star reports to save them
  • Special discount for yearly subscriptions

Prices exclude any applicable taxes.
Available features may vary according to operating systems.
Compare all products & features.

Breach Monitoring

By Prey

A complete dark web monitoring system guarding your company's data 24/7

Identify your email & domain exposure on the Dark Web

Understand the scope of your data compromises: Credentials, financials, personal details, and more

Understand how your security protocols stand up against real-world Dark Web threats

Stop minor leaks before they become catastrophic breaches

Compare all Features

Prey Free

1 device slot

Free
Prey Starter

5 device slots

$2.99/month
Tracking and Monitoring
Geolocation Tracking
Limited accuracy
Enhanced accuracy
Hardware Information
Activity Log
 (24 hours)
 (24 hours)
Hardware Changes
Missing Report Features
Mark as Missing/ Recovered
Missing Reports
20 fixed report slots. Users must delete old reports to allow for new ones.
20 report slots that self-rewrite. Users can star reports to keep them.
Report Frequency
Every 10 or 20 minutes
Every 10 or 20 minutes
Front and Back Silent Camera Pictures (opt-in)
Screenshot (opt-in)
Data and Device Security
Screen Lock
Remote Alarm
Alert Message
Reusable Slots
Credit Card
PayPal
See yearly prices
Sign up for 2 years
15% OFF

Prey
Tracking

Locate & monitor devices
$
1.3
/month
Billed annually
15% OFF by signing up for 2 years
Monitor your organization's complete fleet with always-on tracking and more:
  • Missing Reports
  • Geofences
  • Screen Lock
  • Alarm
  • Alert

Prey
Protection

Track & secure fleets
$
1.95
/month
Billed annually
15% OFF by signing up for 2 years
Every feature included with Prey Tracking, plus:
  • Geofence Actions
  • Custom Wipe
  • Factory Reset
  • Remote Encryption

Prey
Full Suite

Track, protect & manage fleets
$
2.25
/month
Billed annually
15% OFF by signing up for 2 years
Enjoy all the features of other plans, plus these exclusive additions:
  • Mass Actions
  • Audit Log
  • Device Loan Manager
  • Automations
  • 24/7 priority support
Device slot based pricing. Individual device price drops when achieving slot tiers.

Prices exclude any applicable taxes.
Available features may vary according to operating systems.
Compare all products & features.

Breach Monitoring

By Prey

A complete dark web monitoring system guarding your company's data 24/7

Identify your email & domain exposure on the Dark Web

Understand the scope of your data compromises: Credentials, financials, personal details, and more

Understand how your security protocols stand up against real-world Dark Web threats

Stop minor leaks before they become catastrophic breaches

Talk to an expert!

Compare all Features

Prey Full Suite

Starting at

$2.25* USD
month, billed annually
Prey Protection

Starting at

$1.95* USD
month, billed annually
Prey Tracking

Starting at

$1.30* USD
month, billed annually
Tracking and Monitoring
Geolocation Tracking
Hardware Information
Activity Log
 (1 month)
 (1 month)
 (1 month)
Location History
 (1 month)
 (1 month)
 (1 month)
Hardware Changes
Radius Geofences
Geographic division Geofences
Custom Geofences
Geofence Alerts
 (Unlimited)
 (Unlimited)
 (Unlimited)
Geofences Actions
Missing Report Features
Mark as Missing/ Recovered
Missing Reports

Once the limit number is reached, new reports start to overwrite older ones. Reports may be starred in your panel to keep them from disappearing.

(Up to 100)
Report Frequency
Every 2, 5, 10 or 20 minutes
Every 2, 5, 10 or 20 minutes
Every 2, 5, 10 or 20 minutes
Front and Back Silent Camera Pictures (opt-in)
Screenshot (opt-in)
Data and Device Security
Screen Lock
Remote Alarm
Alert Message
Custom Wipe
File Retrieval
Remote Encryption
Clear Passcode
Factory Reset
Kill Switch
Multi-Device Management
Multi-user Accounts
Global Management Panel
Fleet Status Dashboard
Email Notifications
Groups and Labels
Users, Roles and Permissions
Device Connectivity Tracking
User Contact Assignment
Advanced Search
CSV Data Exports
Developer API
Unattended Installation
Two Factor Verification
SSO/ SAML
Custom Fields
Loan Manager
Mass Actions
Audit Log
Automations
Event-based Automations
One-time Automations
Time-frame Automations
Other
Reusable Licensing
Flexible Plan Upgrade
Customer Success Management
Priority Support
Unlimited Users
Priority Support
Credit Card
PayPal
ACH Transaction
Flexible Licenses

Prey
Custom

Let's create a plan tailored to your needs!
Tailored pricing
  • Choose the most relevant features for your budget and use cases
  • Work with an expert to tailor your experience and get fitted recommendations
  • Pay only for the features that you select
  • Have a little bit of everything: Monitor, Protect and Track devices

Prey for
Chromebooks

Made for ChromeOS device fleets
Special price reduction!
  • Make the most out of your budget so you can protect your entry-level devices
  • Work from Google Admin Console and get the features from Google and Prey!
  • Upgrade or downgrade your device slots and easily reuse your licenses
  • Access Priority Support from the get go
Device slot based pricing. Prices exclude any applicable taxes.

Available features may vary according to operating systems.
Compare all products & features.

Breach Monitoring

By Prey

A complete dark web monitoring system guarding your company's data 24/7

Identify your email & domain exposure on the Dark Web

Understand the scope of your data compromises: Credentials, financials, personal details, and more

Understand how your security protocols stand up against real-world Dark Web threats

Stop minor leaks before they become catastrophic breaches

Read about Prey for Education users

"With Prey, we can lock down devices, set loan timelines, and even recover equipment that’s gone missing. It gives us the control we need, and it’s incredibly easy to use."
Melissa Gear
Director of Service Delivery, Rock Valley College
“Prey has been instrumental in ensuring the return and security of our equipment. In instances of misplaced devices, its tracking capability offers a rough location, such as identifying a device is in Building B, enabling us to swiftly locate and secure it.”
Nicole McClintock
IT Support Coordinator, Salina Area Technical College
“If a teacher's laptop is lost, stolen, or subjected to any other issue, we have Prey as a resource to assist in retrieving the device, wiping the drive, or locking the user out, among other features that Prey provides.”
Michael Jacobs
Director of IT, The Holy Ghost Preparatory School 

Compare all Features

Prey Custom

All available features for

Custom Plans

Availability might change depending on the operating system

Prey for Chromebooks

All available features for

Chromebooks
Tracking and Monitoring
Geolocation Tracking
Hardware Information
Activity Log
 (1 month)
 (1 month)
Location History
 (1 month)
Hardware Changes
Radius Geofences
Geographic division Geofences
Custom Geofences
Geofence Alerts
 (Unlimited)
 (Unlimited)
Geofences Actions
Missing Report Features
Mark as Missing/ Recovered
Missing Reports

Once the limit number is reached, new reports start to overwrite older ones. Reports may be starred in your panel to keep them from disappearing.

(Up to 100)
Report Frequency
Every 2, 5, 10 or 20 minutes
Every 2, 5, 10 or 20 minutes
Front and Back Silent Camera Pictures (opt-in)
Screenshot (opt-in)
Data and Device Security
Screen Lock
Remote Alarm
Alert Message
Custom Wipe
Users and data
File Retrieval
Remote Encryption
Clear Passcode
Factory Reset
Using Google Admin Console
Kill Switch
Multi-Device Management
Multi-user Accounts
Global Management Panel
Fleet Status Dashboard
Email Notifications
Groups and Labels
Users, Roles and Permissions
Device Connectivity Tracking
User Contact Assignment
Advanced Search
CSV Data Exports
Developer API
Unattended Installation
Two Factor Verification
SSO/ SAML
Custom Fields
Loan Manager
Mass Actions
Audit Log
Automations
Event-based Automations
One-time Automations
Time-frame Automations
Other
Reusable Licensing
Flexible Plan Upgrade
Customer Success Management
Priority Support
Unlimited Users
Priority Support
Credit Card
PayPal
ACH Transaction
Flexible Licenses
ShopperApproved
A
VoiceScript Technologies
DigaCore Technology Consulting
Khobar Electric
Innova Secure
Truthful Taxes
H3Cyber
Anderson Technology Services
TST for Everything IT
ShopperApproved
A
VoiceScript Technologies
DigaCore Technology Consulting
Khobar Electric
Innova Secure
Truthful Taxes
H3Cyber
Anderson Technology Services
TST for Everything IT
Hamilton Point Investments
Tang Technology
403Tech IT Solutions Provider
KJA
Majuba College Technical and Vocational Education and Training
Atom CTO
ITM 247 Managed Cloud Solutions
Heritage Cooperative
Rent your Mac
Sydnic Computer Systems Inc.
Hamilton Point Investments
Tang Technology
403Tech IT Solutions Provider
KJA
Majuba College Technical and Vocational Education and Training
Atom CTO
ITM 247 Managed Cloud Solutions
Heritage Cooperative
Rent your Mac
Sydnic Computer Systems Inc.

Our users said it best!

Take a look at some of our most loved capabilities as recognized by G2 and our users.

9.2/10

Ease of Use

A service that offers intuitive design, streamlined navigation and customizable features enabling users to accomplish tasks effortlessly.

9.6/10

Quality of Support

A prompt and knowledgeable assistance. Proactive outreach empowers users, making sure their needs are met efficiently and effectively.

9.6/10

Ease of Setup

With an intuitive onboarding and comprehensive guidance, the initial configuration is a streamlined process with minimal effort.

Prey is recognized as a

leader

in several industries

Set it and forget it device security.
"Quick to set up and easy to use. It adds a level of security that just lets me sleep at night."

Tim P.

Quality, reliability, and exceptional support.
"What I appreciate most is the consistency in meeting our needs."

Sara D.

Great tool for securing your devices.
"The interface is user-friendly and it just works. The team is always open to suggestions and will work to implement features we recommend."

Don H.

GPS Tracking made easy!
"Prey makes it easy to add (and remove) computers, tablets, mobile devices, etc to their MSP portal. Peace of mind for everyone."

Tara N.

Easy to use and it just works.
"Simple little install and then I can see all my devices in the dashboard. The support team is responsive."

Jasper T.

An affordable way to track and protect your devices.
"Easy to implement, lots of details on the devices being protected and a simple dashboard that we can use to find and manage our devices."

Bhairav P.

Set it and forget it device security.
"Quick to set up and easy to use. It adds a level of security that just lets me sleep at night."

Tim P.

Quality, reliability, and exceptional support.
"What I appreciate most is the consistency in meeting our needs."

Sara D.

Great tool for securing your devices.
"The interface is user-friendly and it just works. The team is always open to suggestions and will work to implement features we recommend."

Don H.

GPS Tracking made easy!
"Prey makes it easy to add (and remove) computers, tablets, mobile devices, etc to their MSP portal. Peace of mind for everyone."

Tara N.

Easy to use and it just works.
"Simple little install and then I can see all my devices in the dashboard. The support team is responsive."

Jasper T.

An affordable way to track and protect your devices.
"Easy to implement, lots of details on the devices being protected and a simple dashboard that we can use to find and manage our devices."

Bhairav P.

Why choose Prey

"What a life-saver! Being able to keep track of our devices is critical."

Prey is a worldwide service for simple yet powerful device protection, used by millions and trusted by thousands of organizations.

Lightweight. Powerful. Simple.

14+
Years

Founded in 2009, Prey keeps going strong!

7.7+ Million

Active Users in more than 170 countries

8.9+ Million

Protected Devices across the Globe

93.3%

Customer satisfaction in support interactions

Frequently asked questions

What is a device slot?

A slot represents one space for a device so you protect it under your account. You will be charged for each slot, assigned or not to a device. They are flexible, you may upgrade and downgrade as you wish.

Are device slots reusable?

Device slots that are assigned may be liberated and reused at any time. When a device is deleted the slot will become available to be used again.

Is there a minimum number of slots that I need to purchase?

Tracking, Protection and Full Suite, our Organization Plans, don’t require a minimum slot purchase, you decide how many devices you need to protect. Price per slot decreases as you increase your total, past the 50 slot mark.

What are your accepted payment options?

We accept credit cards, PayPal, Wire Transfer, and ACH* at this time. Checks are not accepted. Purchase orders will be requested if you're a business in the US and selected countries (*USA only).

Do the prices include taxes?

The published prices do not include any applicable taxes. These additional charges vary greatly by country and will be disclosed before your final payment confirmation.

Do you offer a free trial?

Yes! We offer a 14-day free trial with 100 slots to let you test drive Prey. Any Organization Plan of your choosing. You are welcome to purchase the plan you prefer directly from the Panel during your trial period.

Any discounts available?

Every user gets a price reduction for choosing a two year billing cycle. Additionally, Non-profit, NGO and educational organizations are eligible for an extra discount on their plan subscription. Request a quote.

Does Prey provide any sort of Partnership Program?

We currently work with Managed Service Providers and Resellers. Follow the links to learn more about them and find out which one best adapts to your business model.

Who should I contact with further commercial questions?

In case you have additional doubts or want to inquire about your purchase process, please contact our Sales team at sales at preyproject dot com

Explore more options

Are you interested in protecting your Personal devices?

Are you wondering if Prey offers MSP capabilities?

Are you a Reseller looking to offer Prey to clients?