Integrate multi-os laptops, tablets, and corporate mobiles under a single management platform. Organize them in groups, assign them users, and automate their management.
Have a thorough inventory of your on site and off site remote fleet, its hardware, assigned user, and activity.
View each device's hardware, operating system, and modifications carried out on these two.
Keep a tab on the user that has been assigned to the device, and connect it to an institution.
Check if the device is online or when it was last seen, see its active network, battery status, and which active user is currently logged in and using it.
Export your fleet's complete data for review, presented in a formatted csv file right to your account's email.
Maintain a registry of your account activity and all actions or modifications made by users for better accountability and auditing.
Deploy Prey in bulk and easily manage hundreds of devices by grouping and assigning them.
Create time-based rules, or event-triggered actions to automate security and device management.
Group your devices with custom labels, with a robust search engine that can filter by hardware, OS, user, and a lot more.
Quickly schedule and deploy our lock, wipe, alert, and alarm features to multiple devices at once.
Silent and unattended installers for every OS, automatic updates, and custom APKs.
Lend and keep track of devices with or without a return date, send automatic 'time's up' alerts, or lock and track the equipment when not returned.
Stay on top of your device fleet's security with custom risk detection alerts and information.
View your entire fleet's activity globally with graphic insights regarding their movements, recent reports, demographics, and checked-in status.
Configure Prey's notification settings regarding Control Zone movement detection, missing device evidence reports, alerts for suspiciously offline devices, and more.
Review the device's triggered events in the platform, hardware modifications, and connections.
Access a platform that's ready to adapt to your privacy policies and management needs.
Each report carries a map with nearby hot-spots, coordinates, and the pinpointed location of the device.
Prey's tracking and security tools are customizable and can be turned off comply with an enterprise's user privacy policies.
Access further iOS and macOS management capabilities by linking your Prey account to an MDM certificate by Apple.
Set up an extra layer of security in your account by adding 2-factor authentication.
Access new ways of using your account's data with Prey's API, enabling integrations and external developments.
Using multiple tracking technologies, Prey ensures you always know where your fleet is and when it behaves suspiciously.