Device tracking and inventory management

Know exactly where your company devices are, always

Track all company devices, their status, and manage their lifecycle from one dashboard. With Prey, you get peace of mind and total operational oversight.

An astronaut sits holding a tablet, looking at a card showing 55 devices Online and 5 Offline, superimposed over a partial map with three location pins. It illustrates comprehensive device tracking.

Struggling to keep up with your devices?

Stop inventory chaos

Quit the endless search. Prey gives you an accurate record of all your devices in real time, so you always know what you have and who has it.

Close security gaps

Prey protects your devices and data with always-on location services and remote security tools. Make sure that no device poses a risk to your company.

Automate tasks efficiently

Free your team from manual audits. Prey let's you plan ahead, automate actions and save time to focus on more strategic tasks.

Prioritize compliance

Unknown device locations and users can lead to compliance violations for your organization, particularly when sensitive data is involved.

The Prey solution:

Simplified device inventory and tracking  

Unrivaled visibility

Get a complete, real-time overview of every device in your fleet.

Always-on tracking

Get continuous location updates in real time for every device.

Device view

See hardware specs, battery status, and more from a single dashboard.

Missing reports

Mark a device as missing to gather detailed reports.

Location history

View a device's past locations for the last month.

An illustration of a hand holding binoculars over a map with four numbered location pins. A card shows a Report ID and action buttons. Data cards display rich information like device specs, network details, and photographic evidence, emphasizing comprehensive visibility.

Effortless inventory management

Ditch the spreadsheets and manage your assets with a powerful, automated system.

Icon of a user credential card

User and device assignment

Easily assign devices to employees, students, or teams, and keep accurate location records.

Custom labels and groups

Organize your fleet by department, location, or any custom category to streamline management.

Permissions and compliance

Make sure the right people in your team has access and lockout the rest. Activity log spills the details for you.

An illustration of a hand tapping a user profile card over a map background. A prompt says, 'Assign device to,' with an example email address in the input field, symbolizing easy device assignment and inventory control.

Proactive device protection

Automatically secure devices and mitigate risks before they escalate.

Icon of a pin marking a point on a map

Geofences

Create virtual safe perimeters. Receive alerts and set up automated actions when devices enter or leave them.

Remote security

Trigger data wipes and lock screens adding an extra layer of protection.

An illustration showing a laptop protected by a shield and a padlock over a map with four location pins inside a shaded zone. Below, four buttons read: Remote Alarm, Alert Message, Screen Lock, and Mark as Missing, symbolizing proactive device protection actions.
"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

"Prey handles exactly what we need it for - tracking equipment, securing it when needed, etc."

Mike M. at SBMA

"It protects devices and data from damage and attack.”

Solomon D. at Hope Walks

“Prey has been great, consistently. Always top notch.”

Andy M. at Stafford-Smith, Inc.

“I find Prey to be an incredible product.”

Jairo B. at Aboissa Commodity Brokers

Your entire fleet at a glance

Visualize your device locations on a map, assign users, and take action, all from one intuitive control panel. Watch a Demo to see it in action.

Explore more

A comprehensive guide to device tracking software

Learn the differences and nuances of device tracking software, to choose the perfect fit for your client or organization.

This document highlights the challenges of managing rental devices and how Prey offers solutions like remote security, automated tracking, and compliance features.

Frequently asked questions

Below, you'll find answers to commonly asked questions about our products/services. Feel free to reach out to us directly for further assistance. We're here to help!

What types of devices can Prey track and manage?

Prey is a multi-platform solution that works on a wide range of devices. This includes laptops (Windows, macOS, Ubuntu), smartphones and tablets (Android, iOS), and even Chromebooks. As long as a device can run our agent, you can track it.

How does Prey's device tracking work?

Prey uses a combination of technologies for location tracking, depending on the OS in question. We use GPS, Wi-Fi triangulation, mobile data and sometimes a mix of them. Android and iOS rely on GPS being on. Windows relies on triangulation and requires the Wi-Fi adapters to be turned on. This multi-layered approach ensures that you can locate a device even if GPS is off or unavailable, providing the most accurate location possible.

Is Prey just for tracking lost or stolen devices, or can it be used for day-to-day inventory?

While Prey is renowned for its location and recovery features, it has enough device and user management features to be a well-rounded administration solution. Our platform is designed to help manage and take inventory of devices. You can use it to know which employee has which device, see its hardware status, and manage your entire fleet, even when devices are safe and in use.

What kind of information does Prey's inventory management system provide?

Our dashboard gives you a comprehensive view of your device fleet. You can see crucial details like:

  • Auto-updating map location
  • Assigned user
  • Custom labels
  • Hardware information (RAM, CPU, storage)
  • Network connections
  • Device health (battery level, last connection time)
How does Prey help with device security beyond just tracking?

Prey's capabilities extend beyond location. You can remotely perform actions to secure your devices. This includes:

  • Remote Lock: Instantly lock a device to prevent unauthorized access.
  • Data Wipe: Erase sensitive data from a device to protect company information.
  • Geofencing: Set up virtual location boundaries and automatically trigger actions (like a notification or lock) if a device enters or leaves a specific area.
Is the Prey platform easy to set up and use for a large number of devices?

Yes. Prey is designed for scalability and ease of use. You can quickly enroll devices in bulk and manage them all from a single, intuitive dashboard. We also offer dedicated support to help you with the onboarding process and ensure a smooth integration into your existing IT workflow. Prey also has app packages available for mass MDM deployment.