WE'VE GOT YOU COVERED!

The Prey Blog
Straight from our labs

MDM Spotlight Nº2: Tidy up with Advanced Search & Labeling

by Nicolas Poggi July 19, 2017

Spotlight number dos! There's no Mobile Device Management without some organization and tidiness.

Coming up on this spotlight, our Advanced Search & Labeling features. The second key milestone on our Mobile Device Management (MDM) package. Without it, using our upcoming feature, Mass Actions, wouldn't be so easy!

Read More

MDM Spotlight Nº1: Control Zones, the first step to this Summer's Release.

by Nicolas Poggi July 19, 2017

Summer comes with a great release! Say hello to the upcoming Mobile Device Management (MDM) package.

With the arrival of our new Mass Actions feature at the end of this month, we're happy to say we'll reach an important milestone: our core MDM feature timeline will be complete!

It's a road our developers started ridin' a year ago, working on better solutions for mass deployments. Step by step, each new feature released: Control ZonesAdvanced Search & Labeling, File Retrieval, and today, Mass Actions

Read More

Prey Business adds Anti-Theft and Mass Management features for more secure mobile environments

by Matias Wolff July 19, 2017

San Francisco, July 19, 2017 – Prey Software, provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, today announced a new version of its enterprise offering with improved anti-theft and multi-device management capabilities. The new geofencing and file retrieval capabilities in Prey Business helps small and medium-sized businesses (SMBs) secure devices before they can be lost or stolen, while advanced search, labeling, and mass action tools enable organizations to track and control in environments with 30 or more devices.

Read More

Fog computing or edge computing: I ain't afraid of no technology

by Matias Wolff June 15, 2017

Fog Computing or Edge Computing is so much more than the latest "hip term" in Silicon Valley.
 
It has nothing to do with misty graveyards or horror movies. It does have everything to do with the current and future viability of the Internet of Things (IoT).

Read More

3 Key Internet of Things trends to keep your eye on in 2017

by Matias Wolff June 9, 2017

If the Internet of Things (IoT) doesn't prove the future is now, nothing does.
 
 
For now the industrial sector leads the development of IoT solutions. Many promising use cases in business are coming to light.

Read More

Geofencing: 7 commercial and industrial use cases

by Matias Wolff June 1, 2017

Geofencing technology is a recurring subject in our blog because it’s so useful and flexible.

So far we have put greater focus on managing geofenced devices . But some commercial and industrial applications offer benefits beyond data and hardware security.

Read More

Customer Support should listen to The Boss and keep that human touch

by Fabián Núñez May 8, 2017

The Boss, Bruce Springsteen, said it best in his 1992 hit “Human Touch”: In a world without pity, do you think I'm asking too much? I just want something to hold on to, and a little of that human touch.

I think of this song whenever I need Customer Support. As I listen to endless recordings, fill out never-ending forms, and wade through useless user forums, my frustration levels go waaaay up. To the point I just want to ask:

Read More

Track your device, and snap the Prey ;-)

by Matias Wolff April 28, 2017

CBS 5 ran a story on how Prey helps recover lost devices and how all its features work, along with one of our many success stories by not only talking with an user who recovered his notebook, but also showing how Prey works in real time.

Read More

Security software: how to track your devices on iOS without it

by Matias Wolff April 10, 2017

I hate to ask this, but, did you lose one of your iOS devices and forgot to install a security software with tracking?

Don’t worry, there are still some options that can help you recover an iPhone, iPad, or iPod without having proper security software. We hope that next time you’re way more prepared with an app like Prey ;).

Read More

Data Security: what are DDoS attacks and how do they affect it?

by Matias Wolff April 6, 2017

It's likely that, on more than one occasion, you’ve entered a website only to discover that it's down for unspecified reasons. Soon enough, you come to know that the service was the target of an attack, and it had to shut down for a while. Hacking is usually the first conclusion, but actually, it could have been something far more subtle and direct than that. We are talking about a DDoS attack, one of -if not the most common type of attacks today, which cost millions every year to institutions.

Read More