Email iconBook a guided demoIn this walkthroughMain table — Your fleet at a glance: connections, locations, actions, and status in one master view.Customize the table — Add, remove, and rearrange columns to show exactly the data your team needs.
More resourcesBreach Monitoring for EmailsTrack individual email addresses for dark web exposure — ideal for monitoring C-level executives, key clients, or high-risk accounts.Location-based securitySet geofences around approved zones and let Prey enforce the rules 24/7, lock, alert, or wipe automatically when a device crosses.Device Rental SecurityTrack, protect, and recover rental fleet devices. Enforce contracts, lock unreturned units, and wipe data on leased endpoints.