Prey

For
Business
WE'VE GOT YOU COVERED!

More Than a security app:
Tracking Devices & data recovery

Find my phone, my laptop, my tablet. Get pictures, location, data wipe and recovery from missing devices. Multiplatform, open source and free!

Cross-devices

Apple Icon Andriod Icon Linux Icon Windows icon
Get Prey Now

Cross-devices

Apple Icon Andriod Icon Linux Icon Windows icon
Get Prey Now

Prey functions

Tracking devices just got real

Find your laptop or your phone stolen sucks, but there is something you can do about it. Prey is a lightweight anti theft protection software that helps you recover them if ever lost or stolen.

All you need to

Protect your devices

Prey will sleep silently in the background awaiting your command.

LEARN MORE
All you need to protect your devices

Lost Device Recovery

Lost Device Recovery

Prey will gather and deliver detailed evidence back to you, including pictures of who's using your stolen device – often the crucial piece of data that police officers need to take action.

Device Data Management

Data management

When your data is at stake, bad things can happen. Prey allows you to remotely wipe all your information, lock the device down, and even retrieve your most important files.

Device Management Single Account

A single account

Different operating systems and different devices? Not a problem. Prey works smoothly on all major operating systems and lets you track them from a single place; your web control panel.

It doesn’t get

better than our device report

Tracking devices is easy, we take gathering evidence to another level. When you lose a device, this is what Prey will do for you:

You’ll get our reports with all the information you need with solid evidence to find your lost device: track geolocation, silently taken pictures, surrounding Wi-Fi networks and screenshots. Reports are often the crucial piece of evidence the police needs to retrieve stolen devices.

Prey works

Recovery cases all over the world

Sign up now

Your privacy is our priority

Sensitive data is gathered only when you request it, and it is for your eyes only ‐ nothing is sent without your permission. Our proof of transparency is our code.

Check Prey's source code