
Who Uses Prey?
Prey serves enterprises of all sizes, from global to SMBs, and individuals who require personal device security.
What Is Prey?
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc.
Prey Details
Prey
https://www.preyproject.com/
Founded 2009











Prey pricing overview
See pricing plansPrey has a free version and offers a free trial.
Pricing Details
Customized pricing for Enterprises, and discounts for Schools & non-profit.
Free Version
Yes
Free Trial
Yes, get a free trial
Prey deployment and support
Support
- Chat
Deployment
- Cloud, SaaS, Web-based
- Mac (Desktop)
- Windows (Desktop)
- Android (Mobile)
- iPhone (Mobile)
- iPad (Mobile)
Training
- Live Online
- Documentation
Prey Features
Asset Tracking Software
- API
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Asset Management
- Asset Tracking
- Audit Management
- Audit Trail
- Barcode / Ticket Scanning
- Barcode Recognition
- Barcoding/RFID
- Calendar Management
- Check-in/Check-out
- Compliance Management
- Contract/License Management
- Cost Tracking
- Customisable Forms
- Customisable Reports
- Customizable Fields
- Data Import/Export
- Depreciation Management
- Dispatch Management
- Disposal Management
- Document Management
- Equipment Maintenance
- Equipment Tracking
- Fixed Asset Management
- Historical Reporting
- IT Asset Tracking
- Inventory Management
- Inventory Tracking
- Location Tracking
- Maintenance Management
- Maintenance Scheduling
- Mobile Access
- Monitoring
- Multi-Location
- Purchase Order Management
- RFID Scanning
- Reminders
- Reporting & Statistics
- Reporting/Analytics
- Reservations Management
- Search/Filter
- Status Tracking
- Tagging
- Third Party Integrations
- User Management
- Work Order Management
- Workflow Management
Computer Security Software
- API
- Access Control
- Access Controls/Permissions
- Active Directory Integration
- Activity Dashboard
- Activity Tracking
- Alerts / Escalation
- Anti Spam
- Anti Virus
- Application Security
- Audit Management
- Audit Trail
- Authentication
- Best Practices Repository
- Compliance Management
- Data Security
- Data Visualisation
- Endpoint Protection Software
- Event Logs
- Event Tracking
- Financial Data Protection
- HIPAA Compliant
- Incident Management
- Maintenance Scheduling
- Monitoring
- Network Security Software
- Password Management
- Patch Management
- Policy Management
- Privileged Account Management
- Real Time Monitoring
- Real Time Reporting
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analytics
- Risk Assessment
- SSL Security
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Monitoring
- Single Sign On
- Third Party Integrations
- Two-Factor Authentication
- User Management
- Virus Definition Update
- Vulnerability Protection
- Vulnerability Scanning
Cybersecurity Software
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Anti Virus
- Assessment Management
- Audit Management
- Audit Trail
- Authentication
- Behaviour Tracking
- Behavioural Analytics
- Collaboration Tools
- Compliance Management
- Data Visualisation
- Endpoint Management
- Event Logs
- HIPAA Compliant
- IOC Verification
- Incident Management
- Monitoring
- PCI Compliance
- Patch Management
- Policy Management
- Prioritisation
- Real Time Analytics
- Real Time Data
- Real Time Monitoring
- Real Time Notifications
- Real Time Reporting
- Remote Monitoring & Management
- Reporting & Statistics
- Risk Alerts
- Risk Analytics
- Risk Assessment
- SSL Security
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Monitoring
- Single Sign On
- Third Party Integrations
- Tokenization
- Two-Factor Authentication
- User Management
- Vulnerability Scanning
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Data Loss Prevention Software
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts / Escalation
- Anti Spam
- Anti Virus
- Audit Trail
- Automatic Backup
- Backup and Recovery
- Compliance Management
- Compliance Tracking
- Compression
- Configurable Workflow
- Configuration Management
- Data Recovery
- Data Replication
- Data Storage Management
- Data Synchronisation
- Disaster Recovery
- File Management
- File Transfer
- HIPAA Compliant
- Incident Management
- Issue Management
- Monitoring
- Multiple Data Sources
- Policy Management
- Real Time Analytics
- Real Time Monitoring
- Real Time Notifications
- Remote Access/Control
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analytics
- Risk Assessment
- Scheduling
- Secure Data Storage
- Secure Login
- Security Auditing
- Sensitive Data Identification
- Status Tracking
- Task Scheduling
- Third Party Integrations
- User Management
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Endpoint Protection Software
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts / Escalation
- Alerts/Notifications
- Anti Virus
- Application Security
- Applications Management
- Audit Management
- Audit Trail
- Authentication
- Behaviour Tracking
- Behavioural Analytics
- Compliance Management
- Customisable Reports
- Data Visualisation
- Device Management
- Encryption
- Event Logs
- Event Tracking
- HIPAA Compliant
- Incident Management
- Monitoring
- Patch Management
- Policy Management
- Real Time Monitoring
- Real Time Notifications
- Real Time Reporting
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analytics
- SSL Security
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Monitoring
- Signature Matching
- Summary Reports
- Third Party Integrations
- Two-Factor Authentication
- Uptime Reporting
- User Management
- Vulnerability Scanning
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
IT Asset Management Software
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Tracking
- Alerts/Notifications
- Asset Management
- Asset Tracking
- Audit Management
- Audit Trail
- Barcode / Ticket Scanning
- Change Management
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Configuration Management
- Contract/License Management
- Cost Tracking
- Customisable Branding
- Customisable Forms
- Customisable Reports
- Customizable Fields
- Dashboard Creation
- Data Import/Export
- Data Visualisation
- Email Management
- IT Asset Tracking
- Incident Management
- Inventory Management
- Inventory Tracking
- Knowledge Base Management
- Maintenance Management
- Maintenance Scheduling
- Monitoring
- Prioritisation
- Problem Management
- Procurement Management
- Real Time Reporting
- Reporting & Statistics
- Reporting/Analytics
- Requisition Management
- Role-Based Permissions
- Self Service Portal
- Service Level Agreement (SLA) Management
- Supplier Management
- Support Ticket Management
- Support Ticket Tracking
- Task Management
- Third Party Integrations
- User Management
- Workflow Management
Prey Alternatives
More Prey alternativesPrey Reviews for UK Users
Read all reviewsOverall rating
Average score

Yadah K.
-
Overall Rating5 /5
-
Ease of Use5 /5
-
Features & Functionality5 /5
-
Customer Support5 /5
-
Value for Money5 /5
-
Likelihood to Recommend
- Reviewer Source
- Reviewed on 30/04/2018
"My pc has never felt so safe."
Comments: Safety for my pc - I always know where it is and whether or not it's safe. Prompt emails and rapid response.
Pros: They let me know as soon as my pc has been offline for a certain amount if time - ensuring that I know whether or not my pc is safe. They notify me the second I'm online again, the whereabouts of my pc, etc - so I know I'd have full control of finding it again. I'm very impressed with the prompt response of the Prey team.
Cons: The sleek and modern branding may be too intimidating for some. I think marketing may be limited to pc-techs because no one else I know has heard of it...
- Reviewer Source
- Reviewed on 30/04/2018

Kathryn N.
-
Overall Rating5 /5
-
Ease of Use5 /5
-
Features & Functionality5 /5
-
Customer SupportUnrated
-
Value for Money5 /5
-
Likelihood to Recommend
- Reviewer Source
- Reviewed on 19/09/2018
"Prey helps us keep our laptops safe"
Comments: We started using it to track our tablets and laptops after one was stolen. We love that it is stealthy, and it really gives us peace of mind since we can keep tabs on our expensive computers at all times.
Pros: Prey is stealthy (users don't even know it is installed) and it is super easy to install and setup. You can set your own boundary zone so it only alerts you if a device leaves the zone you set.
Cons: Prey only tracks the devices when they are connected to wifi, but this is really a minor issue since that is basically how any tracking software works. We really don't have any complaints!
- Reviewer Source
- Reviewed on 19/09/2018
Verified Reviewer
-
Overall Rating4 /5
-
Ease of Use5 /5
-
Features & Functionality4 /5
-
Customer SupportUnrated
-
Value for Money5 /5
-
Likelihood to Recommend
- Reviewer Source
- Reviewed on 05/02/2019
"Discreet tracking software"
Pros: This location tracking software can be used on top of existing OS support (e.g. Find My Mac / iPhone), for a secondary way of locating stolen devices. Since it is less well known and more discreet than the built-in solution, the hope is that it is more likely to go unnoticed.
Cons: At some point, the software update system was broken and one of my devices' tracking stopped working. I was only notified after a few days by e-mail that my device had not checked in with Prey's servers for a while, which prompted me to look into it. During that interval, the device was not protected.
- Reviewer Source
- Reviewed on 05/02/2019

Vincent po B.
-
Overall Rating5 /5
-
Ease of Use4 /5
-
Features & Functionality5 /5
-
Customer SupportUnrated
-
Value for Money5 /5
-
Likelihood to Recommend
- Reviewer Source
- Reviewed on 12/03/2021
"A great tool to track devices"
Comments: Overall pretty happy with the app, it's easy to use and manage and provides added security for my devices.
Pros: I've been on the free plan, but it works great in tracking my devices and locking them down if necessary. It's easy to use and monitor your devices in their web app. Their pricing plans are pretty reasonable if you need to upgrade to tracking/managing more than 3 devices.
Cons: Can't think of anything really. Their free plan only includes 3 devices but that's fair enough. If you use it for personal use, that's usually enough.
- Reviewer Source
- Reviewed on 12/03/2021
Sean M.
-
Overall Rating5 /5
-
Ease of Use5 /5
-
Features & Functionality5 /5
-
Customer Support5 /5
-
Value for Money5 /5
-
Likelihood to Recommend
- Reviewer Source
- Reviewed on 23/12/2020
"Prey Project a simple solution to a complex sensitive problem"
Comments: We were looking for a way to prevent any "Lost" device events from growing into bigger concerns. The installs are pretty easy and rarely have trouble connecting the software to the cloud. Once installed we can track where our laptops/tablets were last seen and get IP address/hardware information from them. If someone leave your company during this time of Covid Related Lockdowns it can be an issue forcing the device recovery process, but with Prey you can remotely wipe the device, turn on annoying unstoppable alarms, and lock out the device entirely. Essentially ensuring you get your piece of equipment back. In the event that it is stolen you can have the system set to do all this automatically if the device ever comes back online. You can also activate the camera so you can figure out more information as to where the device is and who has it. For instance you can figure out what coffee shop your salesperson left his laptop at.
Pros: The software is very set and forget, it automatically updates, has a standard whitelisting for your antivirus, and has never caused a False Flag incident for Symantec/Cylance. Once installed you link up to the server type in the username and password and your device is protected. To be honest we really have never had to use it but we have successfully tested it multiple times. There is an amusing alarm function where you can make the device in question loudly alert people around you and it lets you keep track of where your devices are/ what is on them/ get back some data/ and setup a "If it ever comes back online it automatically deletes the device". This was exactly what we wanted incase a laptop is ever lost or is not returned in a timely manner.
Cons: During the initial setup you have to be connected to the internet when you log in and allow the software to connect to the cloud. This sometimes fails but will eventually work once you reinstall. Also you have to install .net 3.5 before hand which can sometimes turn a 5 minute install into a wait while .net installs.
- Reviewer Source
- Reviewed on 23/12/2020