Prey

For
Business

More Than a security app:
Device & data recovery

Find my laptop, my phone, my tablet. Get pictures, location, data wipe and recovery from missing devices. Multiplatform, open source and free!

Cross-devices

ico-apple.svg ico-android.svg ico-linux.svg ico-windows.svg
Get Prey Now

Cross-devices

ico-apple.svg ico-android.svg ico-linux.svg ico-windows.svg
Get Prey Now

Prey functions

Tracking devices just got real

Find your laptop or your phone stolen sucks, but there is something you can do about it. Prey is a lightweight anti theft protection software that helps you recover them if ever lost or stolen.

All you need to

Protect your devices

Prey will sleep silently in the background awaiting your command.

LEARN MORE
All you need to protect your devices

home-lost-device.svg

Lost Device Recovery

Prey will gather and deliver detailed evidence back to you, including pictures of who's using your stolen device – often the crucial piece of data that police officers need to take action.

home-data-management.svg

Data management

When your data is at stake, bad things can happen. Prey allows you to remotely wipe all your information, lock the device down, and even retrieve your most important files.

home-single-account.svg

A single account

Different operating systems and different devices? Not a problem. Prey works smoothly on all major operating systems and lets you track them from a single place; your web control panel.

It doesn’t get

better than our report

Tracking devices is easy, we take gathering evidence to another level. When you lose a device, this is what Prey will do for you:

You’ll get our reports with all the information you need with solid evidence to find your lost device: track geolocation, silently taken pictures, surrounding Wi-Fi networks and screenshots. Reports are often the crucial piece of evidence the police needs to retrieve stolen devices.

Prey works

Recovery cases all over the world

Sign up now

Your privacy is our priority

Sensitive data is gathered only when you request it, and it is for your eyes only ‐ nothing is sent without your permission. Our prove of transparency is our code.

Check Prey's source code