ANTI THEFT & MOBILE SECURITY

The mobile device suite:

Never lose sight of your devices, recover and protect stolen data, and make sure your fleet stays manageable, no matter if it is on site, or out for remote work.

Tracking & Location

Always know where

Track the whereabouts of laptops, tablets and mobiles, and make sure those that shouldn't be taken off site stay in their place with Control Zones that alert exits or entries.

TRACKING PREFERENCES

Prey's default tracking setting, which gathers new locations when movement is detected, together with timed checks. If disabled, on-demand locations are enabled.

CONTROL ZONES GEOFENCING

Instantly know if a device leaves it's defined area, or if it goes somewhere unsafe.

TRACKING BY GPS, WIFI TRIANGULATION, GEOIP

The GPS isn't active? Not an issue, we can triangulate it.

GLOBAL DEVICE VIEW

Easily see your entire fleet's location at once with the global map view.

LOCATION HISTORY

Check for suspicious past positions, or find patterns when looking for a lost device.

Device Security

React, lock, alert

When a device is lost and out of your reach, react with security actions to protect and recover your organization's assets, avoiding anyone from accessing it.

REMOTE SCREEN LOCK

No stranger's hands will access your phone, tablet, or laptop if you remotely lock it.

MESSAGE ALERT

Not all losses are theft, and not everyone's a thief. Try contacting the current device holder.

ANTI-MUTE ALARM

Your device will make a 30-second racket that can't be silenced to help you locate it.

CONTROL ZONE ACTIONS

Configure automatic actions, like the lock, alarm, and alert, for when a device enters or exits a specific Control Zone.

Data protection

Care about data

Protect your own, and your organization's data with a set of data protection tools that's ready to wipe confidential information and usage data, or retrieve specific files.

REMOTE WIPE*

Delete cookies, email data, documents, local cloud storage files, and custom directories on lost devices.
*Directory selection varies depending on the OS.

FILE RETRIEVAL

Select and retrieve specific files and avoid losing your work even after the device was stolen.

REMOTE WIPE [windows]

Activate Windows' full disk encryption tool remotely, BitLocker, to protect data, prevent filtrations, and meet security standards.

kill switch[windows]

Press this emergency button for a quick defense. It will destroy the device's Master Boot Record, rendering the device unusable in a matter of minutes.

FACTORY RESET

This feature remotely restores the device down to factory settings, removing all traces of use from the computer. It’s irreversible, it formats your hard drive and installs the OS all over again. It could take up to an hour.

Device Management

Guard businesses

Control fleets of any size and type. It doesn't matter if they are laptops, tablets, mobiles, or if they are in the office or out of bounds. You can automate their security, and organize them in bulk.

MASS ACTIONS

Program recurrent, repeating, or one-time actions to streamline daily tasks, such as a curfew lock.

MASS ACTIONS

Quickly schedule and deploy our lock, wipe, alert, and alarm features to multiple devices.

ENTERPRISE INVENTORY

Keep track and secure device loans, assign permanent users, see hardware changes, and maintain a record of all account activity for visibility.

LABELS AND SEARCH

Group your devices with custom labels, with a robust search engine that can filter by hardware, OS, user, and a lot more.

FLEET STATUS DASHBOARD

View your entire fleet's activity globally with graphic insights regarding their movements, recent reports, demographics, and checked-in status.

CUSTOM DEPLOYMENTS

Silent and unattended installers for every OS, automatic updates, and custom APKs.

DEVELOPER API

Consume data from your account, develop integrations with third-party platforms, and trigger changes/actions.

Missing Reports

Recover with evidence

The recovery begins when you mark a device as missing in the panel. The Evidence Reports will activate and deliver crucial evidence for the police, in custom time-frequencies.

Picture and screenshots
Active and nearby
wi-fi
Coordinates and map
Device information
Mac Address and IP
Prey is trusted by millions of people, organizations and institutions around the globe

What they say about us

Read More reviews
"With Prey we are able to know the exact location of our devices and if they are compromised we can delete all the files remotely."
"The ability to locate, lock, recover or wipe a protected device brings some peace of mind in such a climate."
"Prey is the most complete mobile application for locating our devices. Simple but very powerful and useful."