Track the location of laptops, phones, and tablets, and ensure you can quickly react to unauthorized movements with geofencing.
Prey's configurable tracking provides multiple-location methods for better accuracy and reliability, without compromising the battery of the device.
Prey's default tracking setting, which gathers new locations when movement is detected, together with timed checks. If disabled, on-demand locations are enabled.
The platform uses combined tracking methods, choosing the most accurate and reliable result from GPS, WiFI triangulation, and GeoIP to locate your phone, laptop or tablet.
View your device's location individually, or keep an eye on all of them at once using the global view.
Create geofencing areas on a map that alert the movement of devices, like those who shouldn't leave the office, and then react automatically.
Delimit areas where devices belong, or where they should/shouldn't move through and detect entries or exits.
Configure each Control Zone with different reactive security actions that activate when a devices moves in or out of them. For example, a lock.
Instantly know when a device moves, triggering setup detection rules of its assigned Control Zone.
Add devices to Control Zones that are relevant to their movement, and create location rules for groups with different needs.
Look back into a device's historic movements, detect odd patterns, and identify possible suspect locations.
All registered locations are organized by date and time, which you can filter using a calendar.
The location history displays a heatmap of the days and hours that registered more activity, for quick identification of suspicious behaviors.
View all of a device's movements in a day in the map, or select a specific hour and view those locations.
The recovery begins when you mark a device as missing in the panel. The Evidence Reports will activate and deliver crucial evidence for the police, in custom time-frequencies.
Each report carries a map with nearby hot-spots, coordinates, and the pinpointed location of the device.
View a list of active and nearby WiFi connections close to the missing device for better location identification.
When available, the report will also bring a front and back camera picture to help you identify the perpetrator and place, as well as a screenshot.
Make sure you can identify your device with its IP, MAC address, serial number, and hardware information. Plus, you see what user is currently logged in.