No other app or service gets as serious as our Prey report. Just set your device to “Missing” on your control panel and you’ll start receiving reports with geolocation, front and back camera pictures, screenshots (on laptops), surrounding Wi-Fi networks and much more information.
No other app or service gets as serious as our Prey report. Just set your device to “Missing” on your control panel and you’ll start receiving reports with geolocation, pictures, and more!.
Read MoreTaken silently so thieves won’t stand a chance. Prey will gather and deliver evidence back to you, including pictures of who's using your stolen device, extremely crucial data for the police.
Read MoreTrack your phone, laptop and tablet - wherever they may be. It doesn't matter where in the world you are or where in the world you think your lost device might be, we've got your back.
Read MoreDon't leave your data at stake. Prey allows you to remotely lock down your devices to ensure that no one can access to your private stuff. Privacy first!.
Read MoreBoom. All gone. Delete everything, from the private to the important to the utterly embarrassing. It's as easy as logging into your account and just selecting the files you wish to delete.
Read MoreCreate zones in your city and get notified whenever your smartphone leaves or enters an area, so no more constantly checking your devices' whereabouts. It's available for iOS and Android.
Read MoreFile Retrieval is our star data recovery feature. Retrieve your sensitive information by getting an email with a download link with what you need. Just make sure the device is online!.
Even if your device’s sound is off, it’ll sound like gangbusters, making your device impossible to miss... even in a cluttered room under a pile of laundry (haven't we all been there?).
Use our versatile search engine to find device information associated to tags and labels. Organizing and categorizing large device fleets has never been easier for busy IT managers like you.
Read MorePro users and Business accounts will have our very dedicated support team helping them and guiding them through every part of the process, from mass deployment to assisting in device recovery.
Manage large fleet of devices smoothy by tagging them and organizing them with our customizable labels. Some fixed labels include device operating system, Prey version, o device type. Simple!.
Read MoreBulk actions is an IT manager's dream come true. Need to trigger a thousand alarms on a thousand different devices? Or maybe set 60 devices to missing? No matter how big the task, we got you.
Sensitive data is gathered only when you request it, and it is for your eyes only ‐ nothing is sent without your permission. Our proof of transparency is our code.
Source Code