UPGRADE YOUR SECURITY.

Enterprise Plan

Personalized protection for fleets of any size
GET A QUOTEStart a free trial

Why Companies Choose Prey

Reactive Security

Setup trigger and time based reactions to events to ensure your reaction is as fast as possible.

Smart Tracking

Follow your devices' movement proactively and detect and react to entries and exits with geofencing areas.

Unified Fleets

Manage on-site and remote fleets with ease under a single platform for laptops, tablets, and mobiles.

Included Features

Tracking and Location
  • Location HistoryCreate areas on a map that act as radars and inform you when certain devices move in or out of them.
  • Control Zones (Geofencing)See your devices past movements by day and hour, filtering by the amount of activity.
  • Global Device View
  • GPS, Wifi Triangulation and GeoIP tracking
Device Security
  • Control Zone ActionsSet up automatic reactions on your Control Zones for when a device moves in or out, like a lock.
  • Remote Screen Lock
  • Message Alert
  • Anti-Mute Alarm
  • Theft Evidence ReportsGet reports on missing devices with pictures, screenshots, locations, nearby WiFis and more evidence.
Data Protection
  • Data and Directory Wipe
  • File Retrieval
  • Remote Encryption [soon]Encrypt files on Windows, macOS and Ubuntu computers remotely to protect data on lost devices.
Device Management
  • Global Management PanelVisualize and manage large fleets in a panel that showcases inventory data and a global fleet map.
  • Fleet Status DashboardSee fleet’s status in a dashboard that displays lost devices, recent reports, activity levels, and more.
  • Scheduled AutomationsSetup timed automations to execute recurring, one-time, or daily actions such as a curfew lock.
  • Mass Actions
  • Labels and Advanced SearchCreate custom labels and group your devices by user, area, or status. Search for specific devices in large fleets using hardware filters and customized labels.
  • Enterprise InventorySee hardware information and changes, active user, battery and connection status, and more.
  • User Contact Assignment
  • CSV Data Exports
  • Multi-User Accounts
  • Mass Deployment
  • Device Loan ManagerManage loaned out devices, keeping track of their return date, sending automatic user alerts, and activating security on overdue equipment.
  • Audit LogKeep track of user activity in your Prey account for better accountability.
  • Developer API
See Full Comparison TableThe limits of each of our services varies between operative systems. You can check the limits of our service here.
What they say about usRead More Stories
BELGIUM

Locked wrongly confiscated laptop until airport security delivered it back.

Read story

Prey is trusted by millions of people, businesses, and institutions around the globe

+7,136,934Awesome Security Heroes

+8,852,602Cool gadgets safe and sound

+230Countries covered

F A Q
FAQ

HOW CAN I PAY?

We accept credit cards. You can also submit purchase orders if you're a business in the US and selected countries.

IS MY BUSINESS TOO BIG FOR PREY?

Definitely not. Do you need to protect 100,000 devices? Sure thing!

CAN I RESELL PREY?

We don't have a reseller/partnership program but we are open to discuss if you have something in mind.

DO I QUALIFY FOR SPECIAL DISCOUNTS?

Educational and non-profit organizations receive a special discount.

CAN I CHANGE MY PLAN LATER ON?

Of course. Don't worry too much about the perfect amount of devices, the account's size can be adjusted to your fleet’s growth.

WHAT IS YOUR CANCELLATION POLICY?

You can leave the service at any time. No strings attached.