What's New

Introducing prey’s new device loan manager

nico@preyhq.com
Nico P.
Feb 20, 2020
0 minute read
Introducing prey’s new device loan manager

Today we’re happy to announce a new feature for our Enterprise plan, requested by our users in Educational institutions and Enterprise organizations, who also helped us shape it up to their need! The Device Loan Manager.

Whether you’re an IT staff at an office, who has to keep track of who has which laptop and assign them to remote workers temporarily; or an IT manager at a University with a laptop loan program for its students, this is the tool for you. Now you will be able to manage these processes through Prey and ensure that your loans are accounted for and followed through, without the extra effort.

On its release, this new tool will be available for computers only (Windows, macOS, and Linux). In the future, we'll increase its scope and functionality. So be sure to test this out, and share your feedback with us regarding what you love, what you don't, and what you're missing.

Managing and Securing Device Loans

The new Device Loan Manager feature allows you to assign a device to a person, keep track of the loan, and secure the device automatically in case of late returns, to ensure its timely return.

At the moment, three type of loans can be set up using this tool:

  • An open-ended loan, with no return date.
  • A timed loan, with a return date.
  • A secured timed loan, with a return date and automatic security.

Prey will automatically notify the user when the device is due, and if he or she is late, you can configure an automatic lock and message to lock the device, avoid unauthorized usage, and prompt the user to return it promptly.

When the loan expires, you will also receive an email notification and be prompted to take action.

From the control panel, you can mark when the device has been returned and finish the loan, making the device ready to be assigned again.

Or if it is missing, or you receive no news from the user, you can mark it as missing to start tracking and gathering evidence to help you secure and recover the lost device.

Get Started!

If you have the Enterprise plan, you'll be able to see find this tool in the device view of any computer. Simply log into your account, find a computer on the device list and click it to access its detailed view. There you will find the LEND DEVICE button.

Thanks! We'll stay tuned for your feedback on this new release as we continue working on bringing new improvements and surprises this 2020.

Frequently asked questions

What is the technology strategy framework?

A technology strategy framework is essential for businesses to effectively leverage technology to enhance operational efficiency, customer experience, and foster innovation while managing risks. This framework is often referred to as IT strategy or digital strategy.

What is an IT strategy framework?

An IT strategy framework is essential for aligning technology initiatives with business objectives, providing a clear structure to achieve strategic goals. By implementing this framework, organizations can ensure that their IT investments effectively support their overall business strategy.

Why is aligning IT goals with business objectives important?

Aligning IT goals with business objectives is crucial because it ensures that IT initiatives directly support the overall business strategy, driving growth and efficiency. This alignment facilitates better resource allocation and maximizes the impact of technology on business performance.

How can emerging technologies be leveraged in an IT strategy?

Leveraging emerging technologies in your IT strategy can drive innovation and create competitive advantages through the development of new business models and increased market value. Embracing these technologies ensures your organization stays ahead in a rapidly evolving landscape.

What are some common challenges in IT strategy implementation?

Common challenges in IT strategy implementation include a lack of alignment with organizational goals, resistance to change from stakeholders, and the tendency to adopt new technologies without clear value, often referred to as "shiny object syndrome." Addressing these challenges is crucial for successful execution.

Discover

Prey's Powerful Features

Protect your devices with Prey's comprehensive security suite.