One account to rule them all. It doesn't matter how many devices you need to protect and manage, or what operating system they run on: Prey's got your back. Organize them and manage them from a single place.
Protect your data, retrieve it, or erase it completely, even if the device is already lost
Get pictures, location, WiFi networks of all of your devices, and more important information...much more!
Bulk actions is an IT manager's dream come true. Need to trigger an alarm on a thousand different devices?. We got you.
Keep large device fleets neat and organized with a versatile search engine and customizable tags.
Liverpool Central School District, $US 7,300 protected devices
Protect your devicesWorks on all major operating systems and devices. Sound alarms, block devices, get reports with pictures and location – often the crucial piece of data that police officers need to take action.
We provide silent, unattended installers for all our supported operating systems, in order to minimize your time and cost of deployment. Updating is done automatically on the background without any need of user input.
Export your device's data, which includes both their hardware information plus the timestamp from when each of them was last seen online. Also, keep record of each of your device's hardware specs, and lets you know whenever a component is modified or removed.
The support team was prompt, very professional and resolved my problems in a timely manner. What else could I ask for? That’s awesome customer service. Keep it up!— Owner of All Pro computer Solutions Healdsburg, CA.
We'll assist you before, during and after the deployment process to ensure everything's working as expected. If needed, we can also assist in the recovery of lost or stolen devices.
Protect your devices nowSensitive data is gathered only when you request it, and it is for your eyes only ‐ nothing is sent without your permission. Our proof of transparency is our code.
Source Code