Prey Anti Theft: Find My Phone & Mobile Security 2.1.7 (Android 4.1+)

image
Prey is an anti-theft, recordsdata security, and tool management app with over 10 years of trip in discovering misplaced phones, laptops, and tablets. Accessible for Android, Chromebooks, iOS, Windows, Linux, Ubuntu, or MAC. All gadgets are managed below a single story and manageable from the app itself or during the on-line panel on the online region.

Introduced in non-public Anti-theft and recordsdata protection version, and its comprehensive tool management substitute for enterprises.

Over 7 million users chose Prey on all platforms.

Aspects
DEVICE LOCATION

► Preserve watch over Zones: Trace areas on a plot that alert tool circulate in and out of them.
► GPS Geolocation: Pin-point accuracy reflected on a plot, with GPS coordinates.
► Space History: Test tool actions in time, and detect suspicious actions.

Aspects
DEVICE SECURITY

► Preserve watch over Zone Actions (Pro*): Activates actions when a tool enters or exits a local.
► Anti-soundless Alarm: Ring an fright that can’t be muted.
► A ways-off Lock: Block the tool’s conceal with a custom passcode remotely.
► Security Message Alert: Say a message on the conceal to alert the patron and place of residing up a return.

Aspects
THE PREY MISSING DEVICE REPORT

The Document is Prey’s key characteristic. When a tool is marked as missing, Prey gathers needed proof to abet the police’s work with:

►GPS Coordinates & Scheme: Ideal when pointing the police in the genuine direction.
►Mac Contend with: With this, and the tool’s IP, no person can snort it’s far indeed your tool.
►Photos: Strive to identify the tool’s set apart with surrounding pictures.
►Wi-Fi Neighborhood: Look all vigorous connections near your tool for better tracking.
►Tool and Particular person Recordsdata: Test an command log, receive any modifications.

Aspects
DATA SECURITY

► A ways-off Wipe (Pro*): Delete native files and SD on misplaced gadgets to guard your privacy.
► File Retrieval (Pro*): Capture out and retrieve particular files and steer clear of losing work on misplaced phones.
► Encryption (Quickly): Remotely encrypt recordsdata till the tool is retrieved.

Aspects
DEVICE MANAGEMENT

The Endeavor thought provides access to an upgraded platform with cell tool management capabilities.

► Scheduled Automations (Pro*): Program recurrent, repeating or one-time actions.
► Endeavor Stock (Pro*): Preserve tune of hardware, adjustments, connection and battery.
► Like a flash Internet page Dashboard (Pro*) : Stare your rapid’s website globally with graphic perception.
► Labels & Grouping (Pro*): Community your gadgets with custom labels and a remarkable search engine.

Your privacy and cell security are our top worry, that’s why we work with OPEN SOURCE code. Your non-public knowledge and recordsdata is most efficient retrieved or light when requested.

Don’t lift our word, lift a ogle at some of our recovery tales:
preyproject.com/blog/en/recovery-tales/

ABOUT PREY
Our firm became born in Chile, with an app that originated in theft itself when the founder’s computer computer became stolen. After long, labor, and loads of improvements, we grew to change into a world solution that makes a speciality of two missions: to support our users anguish less about theft, and give them the tools to stand a probability when losing gadgets, and their recordsdata.

NEED HELP?
Contact us through our Social Accounts:

✔ Twitter: www.twitter.com/preyproject
✔ Facebook: www.facebook.com/preyproject
✔ Neighborhood: neighborhood.preyproject.com/

Phrases and Prerequisites: www.preyproject.com/terms/

*Pro formulation are included in our paid plans: preyproject.com/pricing/

Please Expose: This app uses the Tool Administrator permission. This permits the A ways-off Wipe and Lock characteristic's feature.

• The good judgment of permission requests for the camera, phone, storage, and set apart has been up so far.
• Space permission is requested to “enable step by step” for Android 10.
• Space accuracy has improved when the software program is running in the background.
• Prey acknowledges your tool's identify and might spend the same one need to you set up this tool for the first time.
Gain Now