1:1 device program management

Remote and automated management for 1:1 programs

Prey streamlines device distribution, reinforces accountability, and automates device recovery, freeing up valuable IT team hours. This ensures students consistently have access to the devices they need.

A Prey astronaut stands next to a laptop displaying an 'ACCESS DENIED' screen with an 'OVERDUE' warning label. Above, a card shows the 'Loan end date' input field, symbolizing automated program management and asset recovery control.

The challenges of managing student and faculty devices

Device loan chaos

Without an automated and dedicated system, tracking who has which device and its current status becomes an impossible task. This leads to inaccurate records and wasted staff time.

Unreturned or stolen laptops

Devices for loan programs are frequently lost, stolen, or simply not returned on time, draining resources for departments and preventing them from providing resources to other students.

Icon of two superimposed laptops

Device returns pile up

Manual check-ins create a backlog. Returned devices need condition checks, inventory updates, and data wipes before redeployment. Devices that sit idle make students wait, and your team scramble.

No proof, no accountability

Holding students and faculty accountable for devices is difficult without data. Unmatched records lead to disputes over returned devices. Device management becomes conflict resolution.

The Prey solution:

Time-saving device management for schools

Smart automation for your 1:1 and loaner programs

Level up your 1:1 and loaner programs for accurate, efficient device management, eliminating time-consuming manual processes.

Loan manager

Streamline device loan tracking and eliminate manual spreadsheets. Assign devices to individuals or upload bulk lists for one-to-one programs. Manage alerts from a dedicated dashboard.

Overdue alerts and actions

Automatically remind students when a loan period is about to end and enforce accountability by triggering remote locks on overdue devices—reducing losses and ensuring assets come back on time.

Successful device turnaround

Deploy the Prey agent swiftly using specific commands, quickly preparing devices for new students without manual intervention,Make sure students start the semester without the tools they need.

An illustration of the Prey interface showing the 'Lend device' pop-up window. The 'Loan information' fields include Institution name, user assignment, and critical date fields for 'Loan start date' and 'Loan end date,' symbolizing the setup for smart, automated 1:1 program management.

Simplified fleet management

Streamline device management from deployment to keeping fleets organized.

Icon of a user credential card

Unattended installation

Deploy the Prey agent remotely, or do it in bulk using your MDM solution, simplifying setups with a near zero-touch approach for new devices and employees.

Labels and groups

Organize devices by grade, class, department, or loan status. This makes it easy for your team to quickly find a specific device or audit a group of assets.

Icon of a pin marking a point on a map

Geofences

Create boundaries around the campus, library, or specific buildings and get alerts about movements on your sites.

Security actions

Trigger security actions for devices entering and leaving geofences. Or run protective actions on any device, remotely lock them, or wipe data to protect it and ensure proper offboarding when a student or faculty member leaves.

An illustration of a company building on a map with a 'Current Status: Protected' banner. Data cards display key fleet metrics: device connections (55 Online), activity (Last seen graph), and OS distribution (Windows, macOS, Linux, Chrome, Android), symbolizing simplified and centralized fleet management.

Accountability and compliance built in

Keep your program and organization compliant and maintain a detailed history of all device actions.

Keep logs for internal or external audits

Audit log saves a complete registry of all account activity, user actions, and system interactions. This provides undeniable records and enhances accountability across your IT team.

Custom roles

Create different user roles with specific permissions, ensuring that only authorized staff can manage devices, actions, or even complete sections like Billing to add extra control and security layers.

An illustration of a hand holding a magnifying glass over an event log table, highlighting the search for an event (represented by a question mark). The interface shows records (date, event, author) and tabs for Users, Roles, and Groups, symbolizing built-in accountability and compliance tracking.
"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

A command center for school devices

Prey is a proactive security assistant, tracking and reacting to potential threats. Our panel offers an overview of loaned devices, including assigned users, loan status, and last known locations, streamlining your operations and ensuring smooth organizational fleet management. See for yourself!

Explore more

Rock Valley Success

Learn how Rock Valley College revolutionized device management: From losing laptops to achieving 95% recovery rates with Prey's tracking solution

Stop 1:1 device chaos! Prey helps schools track, manage & secure student laptops & tablets. Simplify management, cut losses & stay compliant.

Frequently asked questions

Below, you'll find answers to commonly asked questions about our products/services. Feel free to reach out to us directly for further assistance. We're here to help!

How does Prey's Loan Manager help me track devices?

Our Loan Manager feature is a dedicated tool for tracking devices assigned to a specific student, faculty, or company member. You can easily see who has which device, when it was loaned out, and its status, all from one centralized panel. This replaces manual spreadsheets and gives you a single source of truth for your entire loaner program.

What happens when a device is not returned on time?

Yes. Our Labels and Groups features allow you to easily organize your devices in any way that works for your school. You can create groups for specific grades (e.g., "7th Grade Laptops"), classrooms, or departments (e.g., "Library Laptops"), which makes inventory audits and day-to-day management a breeze. The same goes for companies lending devices to associates from different teams and offices.

Can I organize devices by classroom or grade level?

Yes. Our Labels and Groups features allow you to easily organize your devices in any way that works for your school. You can create groups for specific grades (e.g., "7th Grade Laptops"), classrooms, or departments (e.g., "Library Laptops"), which makes inventory audits and day-to-day management a breeze. The same goes for companies lending devices to associates from different teams and offices.

How does Prey help with the device intake and audit process?

When a device is returned, you can quickly locate its record in the Prey dashboard to verify its status. Our system provides a clear record of its movements and a full inventory of its hardware. This simplifies the intake process and helps your team get the device ready for the next loan quickly and accurately.

Is Prey’s location tracking useful if all my devices are on campus?

Absolutely. Location tracking is critical even on campus. You can use it to pinpoint a misplaced device in a specific building or room. A remote alarm is great for locating a device stored in forgotten locations. You can also set up Geofences around the campus to get an alert if a device is taken off-site without permission, providing an extra layer of security and accountability.

Can I use Prey for both student and faculty devices?

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Can I use Prey for both student and faculty devices?

Yes. Prey is a flexible solution that can be used to manage devices for your entire institution. You can use Labels and Groups to separate your student loaner devices from those assigned to staff, ensuring that each group is managed with its own set of security rules.