Prey is an anti-theft, files security, and strength administration app with over 10 years of experience in locating lost telephones, laptops, and capsules. Readily available for Android, Chromebooks, iOS, Windows, Linux, Ubuntu, or MAC. All gadgets are managed below a single fable and manageable from the app itself or by method of the earn panel on the web site.
Equipped in inner most Anti-theft and records protection model, and its complete tool administration substitute for enterprises.
Over 7 million users chose Prey on all platforms.
Facets
DEVICE LOCATION
► Control Zones: Invent areas on a blueprint that alert tool circulation within and exterior of them.
► GPS Geolocation: Pin-level accuracy reflected on a blueprint, with GPS coordinates.
► Recount Historical previous: Assessment tool movements in time, and detect suspicious movements.
Facets
DEVICE SECURITY
► Control Zone Actions (Skilled*): Prompts actions when a tool enters or exits an space.
► Anti-still Dread: Ring an apprehension that would possibly perhaps well’t be muted.
► Some distance-off Lock: Block the tool’s cloak with a custom passcode remotely.
► Security Message Alert: Demonstrate a message on the cloak to alert the user and put collectively a return.
Facets
THE PREY MISSING DEVICE REPORT
The File is Prey’s key feature. When a tool is marked as lacking, Prey gathers an crucial proof to abet the police’s work with:
►GPS Coordinates & Arrangement: Ultimate when pointing the police within the ideal route.
►Mac Handle: With this, and the tool’s IP, nobody can declare it is miles indeed your tool.
►Photos: Are trying to identify the tool’s keep with surrounding pictures.
►Wi-Fi Neighborhood: See all active connections shut to your tool for better monitoring.
►Machine and Particular person Data: Assessment an process log, salvage any changes.
Facets
DATA SECURITY
► Some distance-off Wipe (Skilled*): Delete local files and SD on lost gadgets to provide protection to your privacy.
► File Retrieval (Skilled*): Be pleased and retrieve direct files and aid far from losing work on lost telephones.
► Encryption (Quickly): Remotely encrypt files till the tool is retrieved.
Facets
DEVICE MANAGEMENT
The Enterprise thought affords receive admission to to an upgraded platform with cellular tool administration capabilities.
► Scheduled Automations (Skilled*): Program recurrent, repeating or one-time actions.
► Enterprise Stock (Skilled*): Own discover of hardware, changes, connection and battery.
► Like a flash Situation Dashboard (Skilled*) : Survey your rapid’s whisper globally with graphic perception.
► Labels & Grouping (Skilled*): Team your gadgets with custom labels and a sturdy search engine.
Your privacy and cellular security are our high self-discipline, that’s why we work with OPEN SOURCE code. Your inner most files and records is simplest retrieved or extinct when requested.
Don’t receive our be conscious, receive a seek at about a of our recovery experiences:
★ preyproject.com/blog/en/recovery-experiences/
ABOUT PREY
Our company turned into once born in Chile, with an app that originated in theft itself when the founder’s computer computer turned into once stolen. After long, laborious work, and heaps improvements, we grew to turn into a global solution that specializes in two missions: to relieve our users peril much less about theft, and give them the tools to face a probability when losing gadgets, and their files.
NEED HELP?
Contact us by method of our Social Accounts:
✔ Twitter: www.twitter.com/preyproject
✔ Facebook: www.fb.com/preyproject
✔ Team: neighborhood.preyproject.com/
Terms and Prerequisites: www.preyproject.com/terms/
*Skilled facets are included in our paid plans: preyproject.com/pricing/
Please Unusual: This app uses the Machine Administrator permission. This permits the Some distance-off Wipe and Lock feature's feature.
• Our lock feature has been improved so as that the lock will seemingly be finished mercurial after restarting the machine.
Derive Now
No comments:
Post a Comment