Resource Hub

Your one-stop IT knowledge center. Here you'll find the tools, guides & best practices for device management excellence.

Editor's picks

Discover Prey’s 4-layer security approach: device tracking, remote protection, asset management, and dark web breach monitoring, all in one platform.

Prepare, secure, and deploy your school’s devices before day one with this IT-focused back-to-school checklist.

Stop back-to-school 1:1 device chaos: audit, automate & secure every K-12 laptop with Prey

Product Guides

Explore Prey's powerful solutions. Comprehensive overview of features, benefits & pricing options.
Securing Rental Devices with Prey

This document highlights the challenges of managing rental devices and how Prey offers solutions like remote security, automated tracking, and compliance features.

Prey's Proactive Endpoint Security

Prey: The proactive endpoint security guide for the hybrid workplace

Prey’s 4-Layer Security Approach

Discover Prey’s 4-layer security approach: device tracking, remote protection, asset management, and dark web breach monitoring, all in one platform.

White Papers

Learn how to secure & manage devices effortlessly. Expert tips for IT Pros!
Lost corporate laptop response checklist

Don’t leave your data security to chance. Get the technical guide to containing, triaging, and reporting lost corporate laptops in under 24 hours.

Back to School 1:1 program: stop your next school year device chaos

Stop back-to-school 1:1 device chaos: audit, automate & secure every K-12 laptop with Prey

Simplify 1:1 Student Device Management with Prey

Stop 1:1 device chaos! Prey helps schools track, manage & secure student laptops & tablets. Simplify management, cut losses & stay compliant.

Reference Kits

Curated presentations and checklists to help IT teams quickly understand security best practices, compliance requirements, and device management essentials.
Interactive Security Checklist

A useful resource to stop worrying about device security chaos. Ensure total visibility and control over all your devices: download, follow and share this checklist!

Breach Monitoring and the Malware threat

A quick but comprehensive look at the evolving threat landscape fueled by malware-stolen data.

Back-to-School Device Readiness checklist  for K-12 IT Teams

Prepare, secure, and deploy your school’s devices before day one with this IT-focused back-to-school checklist.

Demos

Explore our collection of guided demos and learn how Prey can help you track and protect every endpoint. Control, monitor and locate fleets, protect devices and data and excel at administration of your organization's machines.

Monitor entire company domains for leaked credentials on the dark web — built for organizations with large teams and multiple email addresses.

Track individual email addresses for dark web exposure — ideal for monitoring C-level executives, key clients, or high-risk accounts.

Get to know your panel's main page: the central hub where you monitor connections, status, and details for every device in your fleet.

Policies

Browse downloadable templates and real-world examples of IT security policies, from device management to data protection.

A Phishing Awareness Policy educates staff, defines response protocols, and mitigates breach risks. Essential for robust cyber defense.

A BYOD policy mitigates personal device risks by securing data, ensuring compliance, and defining clear user responsibilities. Essential for IT governance.

A Security Awareness Policy is crucial for mitigating human error, bolstering enterprise security, and maintaining regulatory compliance. Stop staff being 1 click from disaster