Location-based security response

Protect devices with automated location security

You can't be everywhere at once. Prey's location-based security gives you an extra layer of protection, ensuring devices stay where they belong and alerting you the moment they don't.

A smiling Prey astronaut emerges from a computer screen, holding a gold coin or medal with the Prey logo. A large blue shield with a padlock is visible behind, symbolizing the successful and reliable security response driven by location features.

The risk of unmonitored mobility

Misuse of loaner devices

Devices assigned for specific locations, like a classroom or warehouse, could be taken off-site without permission, leading to potential loss or theft.

Compliance violations

For industries with strict data handling regulations, the inability to keep devices within a secured work area can lead to severe penalties and reputational damage.

Delayed incident response

Without ongoing, location-based alerts, a security incident can go unnoticed for hours or even days, dramatically increasing the risk of a data breach.

Icon of a user credential card

Lack of accountability

It's difficult to track who has which device and where it is, making it impossible to hold users accountable for device location and security protocols.

The Prey solution:

Proactive, location-based security

Ongoing auto-vigilance

Gain peace of mind with 24/7 security that works in the background.

Icon of a pin marking a point on a map

Geofences

Easily draw boundaries on a map around key locations like offices, classrooms, or specific work zones to keep a log of device movements.

Location-based actions

Automatically trigger security actions; imagine locking and unlocking screens when a device enters or leaves a specific geofence. Get notified of all comings and goings.

An illustration of a hand pointing at three large location pins on a map. The pins contain icons for a generic office building, a school or government building, and a hospital, symbolizing the definition of secure or important geographical zones for automated vigilance.

Granular, easy to personalize management

Tailor the service to fit your unique operational needs, share responsibilities across your team, and control access efficiently.

Users

Give access to your Prey Panel to as many people on your team as you need. Access is permission-based using predetermined or newly customized Roles.

Icon of a user credential card

Roles

Allow for different levels of access and control to team members. For example, give a department manager permission to view device locations within their team's geofence but not other areas. Or limit access to billing information.

Groups

Assign devices to user groups using device labels.

An illustration of a hand holding a padlock next to a golden key, symbolizing access control. Below, a table displays user roles and their associated permissions, with the 'Roles' tab highlighted, emphasizing customizable and granular access management.

Actionable insights and fast response

Get the evidence you need to respond to an incident quickly and effectively.

Missing reports

When a device triggers a Geofence action, Prey can automatically flag a device to gather continued reports with specific location data, camera photos of the user, screenshots, and other crucial information to assist in recovery.

Automations

Beyond geofences, Prey lets you set up other trigger-based rules to ensure a device is secured if it hasn't checked in for a certain amount of time, has connected to Prey servers, or even is seen after work hours.

An illustration of the three-step flow to create a 'New Automation' in Prey. Step 2 shows the selection of a repeated time trigger condition (days and time), and Step 3 shows the selected action: 'Alert message,' symbolizing fast, automated security response.
"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

See your security goals in action

Prey transforms location data into a robust security tool. It offers a comprehensive map view of all your devices and their assigned Geofences, and provides immediate alerts for automated actions. This clear and actionable overview empowers you to manage your security status effectively, regardless of your devices' locations.

Explore more

A comprehensive guide to device tracking software

Learn the differences and nuances of device tracking software, to choose the perfect fit for your client or organization.

Discover Prey’s 4-layer security approach: device tracking, remote protection, asset management, and dark web breach monitoring, all in one platform.

Frequently asked questions

Below, you'll find answers to commonly asked questions about our products/services. Feel free to reach out to us directly for further assistance. We're here to help!

What is a geofence, and how does it work with my devices?

A geofence is a boundary you draw on a map around a specific location, like your office, a classroom, or a construction site. When a Prey-protected device enters or exits your selected perimeter, it can trigger an automated action, giving you an extra layer of security without needing constant manual monitoring.

What kind of actions can I automate with a geofence?

You can set up a variety of automated security responses. For example, you can configure a device to lock and unlock its screen automatically, trigger a loud alarm, or flag as missing to generate ongoing Missing reports the moment it leaves a safe zone. Your security protocols are enforced even when you're not watching.

How can geofencing help me manage loaner devices or other specific assets?

Geofences are perfect for managing devices that are meant to stay in or out of a specific location. You can create a geofence around a singular work site, or entire countries, your choice. If a device is taken outside your trusted parameter, you can set up notifications and automate security actions, protecting your valuables. You might also use geofences to delimit out-of-bounds areas, so when specific devices enter you get notifications and react accordingly.

How do I get notified when devices enter or leave my geofences?

When Prey detects that a device has crossed a geofence boundary, you can sign up to receive instant email alerts. This allows you to respond immediately and take control, knowing exactly when and where machines are located.

Can I set up different security rules for different devices?

Yes, you can automate actions on selected devices and assign them to specific geofences. Additionally, you can define loan parameters when assigning devices to users, allowing you to tailor your security response to your unique requirements.

How does geofencing enhance security beyond basic location tracking?

While location tracking shows you where a device is, geofencing provides proactive, automated security. Instead of manually checking a map, you can set up a rule once and trust that Prey will notify you and take action the moment a security event occurs, allowing you to prevent a breach before it escalates.