Retrieve files from a device remotely, wipe information and disks on lost devices, or encrypt information to prevent leaks and unwanted access
If a remote worker loses a device, or if an office asset goes missing, wipe your company's confidential information.
Wipe local documents*, cookies, emails, local cloud storage files (Dropbox, Google Drive, OneDrive), or custom directories remotely.
*Directory selection varies depending on the OS.
The wipe action for Android phones enables you to format the SD card or reset the device to its Factory state.
By enabling the MDM certificate on Prey, you can access the Factory Reset action for iOS and Mac devices.
Select and retrieve specific files and avoid losing our work, even after the device is stolen.
Prey's default tracking setting, which gathers new locations when movement is detected, together with timed checks. If disabled, on-demand locations are enabled.
Prey can also access and retrieve files from external SD cards on mobile devices and tablets.
Prevent data leaks and unwanted access on Windows with full disk encryption.
Kill Switch provides a safety solution to a lost or stolen computer. Protect devices that carry information for your trusted eyes only. This is a Windows only feature and some conditions apply.
Let's say you left your device on a park bench. Or one of your students returned a loaned laptop. Wouldn't it be nice to have a solution to remotely remove all traces of previous use? Factory Reset allows just that, a blank slate.
This feature remotely restores the device down to factory settings, removing all traces of use from the computer. It's irreversible, it formats your hard drive and installs the OS all over again. It could take up to an hour.
Apple requires a trust-certificate from Prey that confirms you are the administrator of said devices. By enabling this certificate and linking your Apple device to Prey, you are able to use Factory Reset and completely restore iOS and Mac devices.
Better manage enterprise device fleets with management tools such as grouping, automation, and fleet inventory.