Spotlight number dos! There's no Mobile Device Management without some organization and tidiness.
Coming up on this spotlight, our Advanced Search & Labeling features. The second key milestone on our Mobile Device Management (MDM) package. Without it, using our upcoming feature, Mass Actions, wouldn't be so easy!
Summer comes with a great release! Say hello to the upcoming Mobile Device Management (MDM) package.
With the arrival of our new Mass Actions feature at the end of this month, we're happy to say we'll reach an important milestone: our core MDM feature timeline will be complete!
It's a road our developers started ridin' a year ago, working on better solutions for mass deployments. Step by step, each new feature released: Control Zones, Advanced Search & Labeling, File Retrieval, and today, Mass Actions.
San Francisco, July 19, 2017 – Prey Software, provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, today announced a new version of its enterprise offering with improved anti-theft and multi-device management capabilities. The new geofencing and file retrieval capabilities in Prey Business helps small and medium-sized businesses (SMBs) secure devices before they can be lost or stolen, while advanced search, labeling, and mass action tools enable organizations to track and control in environments with 30 or more devices.
Geofencing technology is a recurring subject in our blog because it’s so useful and flexible.
The Boss, Bruce Springsteen, said it best in his 1992 hit “Human Touch”: In a world without pity, do you think I'm asking too much? I just want something to hold on to, and a little of that human touch.
I think of this song whenever I need Customer Support. As I listen to endless recordings, fill out never-ending forms, and wade through useless user forums, my frustration levels go waaaay up. To the point I just want to ask:
CBS 5 ran a story on how Prey helps recover lost devices and how all its features work, along with one of our many success stories by not only talking with an user who recovered his notebook, but also showing how Prey works in real time.
I hate to ask this, but, did you lose one of your iOS devices and forgot to install a security software with tracking?
Don’t worry, there are still some options that can help you recover an iPhone, iPad, or iPod without having proper security software. We hope that next time you’re way more prepared with an app like Prey ;).
It's likely that, on more than one occasion, you’ve entered a website only to discover that it's down for unspecified reasons. Soon enough, you come to know that the service was the target of an attack, and it had to shut down for a while. Hacking is usually the first conclusion, but actually, it could have been something far more subtle and direct than that. We are talking about a DDoS attack, one of -if not the most common type of attacks today, which cost millions every year to institutions.