Overview: What is Prey and How Can it Help You?
What is Prey?
Prey is a cross-platform, open source security solution that will let you track and recover your devices in case of loss or theft. It can locate your laptops, phones, and tablets on a map, take pictures, screenshots from your computer and remotely wipe the data from your device (except for iOS.)
Prey is both a tiny piece of software installed on devices (the Prey client), and the online system used to track them (your Control Panel.) These combined forces can turn you from victim to superhero, like all these guys and gals.
Why should I set up Prey on my laptop, phone, and tablet?
Prey can protect all your devices, regardless if you're a single person or part of a huge company. As long as they run Windows, macOS, Ubuntu, Android, or iOS, Prey will track them down. Here are some of our most common use cases, but the list goes on and on.
- Recover a device after home or office burglary.
- Lock a cell phone after theft on public transit.
- Ring an alarm to find a misplaced phone at home.
- Delete all sensitive data from a work computer, phone, or tablet remotely.
- Restore to factory settings an Android device.
- Keep track of a big fleet of corporate devices.
- Monitor hardware changes and prevent equipment theft in a computer lab.
- Gather information from devices over time with the Prey reports.
How is Prey different from other tracking solutions out there?
Prey came out in late 2009, and since then, many other alternatives have seen the light. Some have implemented a few of the features that Prey provides, but none of them can protect all your devices from the same place. With Prey, you can consolidate all your security needs on your Control Panel, with no restrictions on device manufacturer or operating system.
Important Notice to Linux Users
We only provide official Linux support for Ubuntu systems. Only a tiny fraction of our users use Linux, and most of them run Ubuntu. Let us know if we can help you with anything else by reaching us at email@example.com.
Prey also provides Reports in addition to real-time location. Reports are generated on intervals set by the user, and include the devices' location, pictures, screenshots, network information, and other data at a given time. These are perfect as evidence when police comes into play. With other providers you know what is currently happening to your computer or mobile; with Prey you also know what has happened over time, and you can save that information for whenever you may need it.
What should I Do to Make Sure That Prey Will Help Me?
To make a long answer short, you need to have Prey installed on your devices before they're lost or stolen. There are some recommended settings per platform, but they all require that you have Prey set under your Prey account and running on the computer or mobile. We do the rest.
You also need devices to be on and connected to the internet in order for them to be tracked. If there is no connection available, actions will remain pending until there is one.
Sign Up And Install
- Download Prey. You can sign up from the installer or from our Panel site.
- Install Prey on your device. You can get Prey for laptops directly from our site. Prey for mobiles is available on the AppStore and Google Play.
- Use your login credentials on the installer, or create a new account in case you don't have one.
- Access your Prey account to make sure that the device was successfully added.
Get Prey to Work For You
In most cases it's enough to finish the installer, but we recommend you to play around with your Prey Panel to make sure that things are properly running. Try to ring an alarm on the panel at the right, or set the computer or mobile to Missing mode to check out reports. Remember to say cheese to the camera, because your picture will be there.
Check Out The Right Plan For You And Your Company
Prey is available for free for everyone, but we also provide paid subscriptions that make things a bit more awesome. Need more reports? Want them faster? No problem.
Plans start at $5/mo for 3 devices, and can go up to a thousand computers or more, in case your organization needs such protection. You can subscribe at any time, request a formal quote or try Prey without commitment for your Business.