A customized experience for larger deployments that makes device management, data protection and device recovery simple and effective.
Centralized device management
One account to rule them all. It doesn't matter how many devices you need to protect and manage, or what operating system they run on: Prey's got your back. Organize them and manage them from a single place.
Data recovery and wipe
Protect your data, retrieve it, or erase it completely, even if the device is already lost
Reports and tracking
Get pictures, location, WiFi networks and much more
Group actions (soon)
Bulk actions is an IT manager's dream come true. Need to trigger an alarm on a thousand different devices?. We got you.
Advanced search and labels
Keep large device fleets neat and organized with a versatile search engine and customizable tags.
Silent but deadly
Prey will sleep silently in the background awaiting your command.
"We’ve been able to recover three more computers that went missing. At an average $1,000 for a computer, we’ve recovered over $4,000 us worth of equipment."
- Liverpool Central School District -
US 7,300 protected devices
A Tracking Software
Works on all major operating systems and devices. Sound alarms, block devices, get reports with pictures and location – often the crucial piece of data that police officers need to take action.
We provide silent, unattended installers for all our supported operating systems, in order to minimize your time and cost of deployment. Updating is done automatically on the background without any need of user input.
Export your device's data, which includes both their hardware information plus the timestamp from when each of them was last seen online. Also, keep record of each of your device's hardware specs, and lets you know whenever a component is modified or removed.
"The support team was prompt, very professional and resolved my problems in a timely manner. What else could I ask for? That’s awesome customer service. Keep it up!"
- Owner of All Pro computer Solutions Healdsburg, CA.
We'll assist you before, during and after the deployment process to ensure everything's working as expected. If needed, we can also assist in the recovery of lost or stolen devices.Protect your devices now
Sensitive data is gathered only when you request it, and it is for your eyes only ‐ nothing is sent without your permission. Our proof of transparency is our code.Check prey's source code