Email iconBook a guided demoIn this walkthroughDevice actions — Lock, wipe, sound alarm, and take screenshots on any device, from anywhere.Automations — Set rules that trigger security actions automatically based on events and timeframes.
More resourcesBreach Monitoring for EmailsTrack individual email addresses for dark web exposure — ideal for monitoring C-level executives, key clients, or high-risk accounts.Location-based securitySet geofences around approved zones and let Prey enforce the rules 24/7, lock, alert, or wipe automatically when a device crosses.Device Rental SecurityTrack, protect, and recover rental fleet devices. Enforce contracts, lock unreturned units, and wipe data on leased endpoints.