
Prey is an anti-theft, files security, and tool management app with over 10 years of abilities in locating lost phones, laptops, and capsules. Available for Android, Chromebooks, iOS, Windows, Linux, Ubuntu, or MAC. All units are managed below a single story and manageable from the app itself or by the gain panel at the gain shriek.
Equipped in deepest Anti-theft and files protection model, and its entire tool management different for enterprises.
Over 7 million users chose Prey on all platforms.
Aspects
DEVICE LOCATION
► Have interaction watch over Zones: Make areas on a scheme that alert tool circulate interior and outdoors of them.
► GPS Geolocation: Pin-level accuracy mirrored on a scheme, with GPS coordinates.
► Bother Historic previous: Take a look at tool movements in time, and detect suspicious movements.
Aspects
DEVICE SECURITY
► Have interaction watch over Zone Actions (Excellent*): Activates actions when a tool enters or exits an shriek.
► Anti-mute Fright: Ring an fear that can’t be muted.
► Some distance off Lock: Block the tool’s camouflage with a personalised passcode remotely.
► Security Message Alert: Expose a message on the camouflage to alert the person and arrange a return.
Aspects
THE PREY MISSING DEVICE REPORT
The Listing is Prey’s key feature. When a tool is marked as lacking, Prey gathers the biggest proof to motivate the police’s work with:
►GPS Coordinates & Plan: Very absolute best when pointing the police within the lawful direction.
►Mac Address: With this, and the tool’s IP, no one can whine it is indeed your tool.
►Pictures: Are attempting to identify the tool’s living with surrounding photos.
►Wi-Fi Neighborhood: Watch all filled with life connections attain your tool for better monitoring.
►Software program and Consumer Info: Test an exercise log, receive any changes.
Aspects
DATA SECURITY
► Some distance off Wipe (Excellent*): Delete local recordsdata and SD on lost units to provide protection to your privateness.
► File Retrieval (Excellent*): Have and retrieve particular recordsdata and steer particular of dropping work on lost phones.
► Encryption (Soon): Remotely encrypt files except the tool is retrieved.
Aspects
DEVICE MANAGEMENT
The Enterprise idea offers entry to an upgraded platform with cell tool management capabilities.
► Scheduled Automations (Excellent*): Program recurrent, repeating or one-time actions.
► Enterprise Inventory (Excellent*): Have interaction notice of hardware, changes, connection and battery.
► Immediate Dwelling Dashboard (Excellent*) : Look your rapid’s living globally with graphic perception.
► Labels & Grouping (Excellent*): Group your units with personalized labels and a sturdy search engine.
Your privateness and cell security are our high scenario, that’s why we work with OPEN SOURCE code. Your deepest files and files is entirely retrieved or feeble when requested.
Don’t take care of our note, take care of a leer at some of our recovery tales:
★ preyproject.com/blog/en/recovery-tales/
ABOUT PREY
Our firm became born in Chile, with an app that originated in theft itself when the founder’s laptop became stolen. After prolonged, laborious work, and loads of enhancements, we grew to change accurate into a world solution that focuses on two missions: to assist our users alarm less about theft, and offers them the instruments to stand a chance when dropping units, and their files.
NEED HELP?
Contact us by our Social Accounts:
✔ Twitter: www.twitter.com/preyproject
✔ Facebook: www.facebook.com/preyproject
✔ Group: neighborhood.preyproject.com/
Phrases and Stipulations: www.preyproject.com/terms/
*Excellent aspects are incorporated in our paid plans: preyproject.com/pricing/
Please Point out: This app uses the Software program Administrator permission. This lets within the Some distance off Wipe and Lock feature's feature.
• The Camouflage feature isn’t any longer on hand in compliance with Android's privateness programs.
• The Prey notification is now proven by default in compliance with Android's policies referring to monitoring capabilities.
Download Now