Prey: Find My Phone & Security

2 years ago 36

Prey is simply a tracking, information information and instrumentality absorption app with implicit 13 years of acquisition successful locating misplaced phones, laptops, and tablets.

Available for Android, Chromebooks, iOS, Windows, Ubuntu and MacOS. All devices are monitored nether a azygous relationship and manageable from the mobile app oregon the online panel.

**Important**:
- The app suggests you disable the “Delete permissions if not used” enactment to guarantee continuous protection.
- The app requires you assistance entree to Management of All Files successful Android 12 oregon later. This support allows for "File Retrieval" (Pro*), beyond images and videos.

- The app requests Accessibility services erstwhile utilizing the "Lock" feature. Accessibility is utilized to artifact the device, showing an "Access Denied" surface overlay.

- The Power Button Lock feature, it lone disposable connected Android versions little than 9. Android 9 and supra see added restrictions that artifact this functionality.

- The app uses the Device Administrator permission. This allows the Remote Wipe and Lock feature's function

- The App petition entree to determination information successful the inheritance to alteration the geo-tracking, geofencing, and determination past features adjacent erstwhile the app is not successful use. While astir Android devices volition automatically petition each indispensable permissions, immoderate request further ones to beryllium granted manually. Check help.preyproject.com for instructions circumstantial to Huawei & Xiaomi devices.

--

DEVICE LOCATION
► Control Zones: Create areas connected a representation that alert instrumentality question successful and retired of them.
► GPS Geolocation: Pin-point accuracy reflected connected a map, with GPS coordinates.
► Location History: Verify instrumentality movements successful time, and observe suspicious movements.

DEVICE SECURITY
► Control Zone Actions (Pro*): Activates actions erstwhile a instrumentality enters oregon exits an area.
► Anti-mute Alarm: Ring an alarm that can’t beryllium muted.
► Remote Lock: Block the device’s surface with a customized passcode remotely.
► Security Message Alert: Display a connection connected the surface to alert the idiosyncratic and put a return.

MISSING REPORTS
This is simply a cardinal feature. When a instrumentality is marked arsenic missing, Prey gathers important grounds to assistance the police’s enactment with:

►GPS Coordinates & Map: Ideal erstwhile pointing the constabulary successful the close direction.
►Mac Address: With this, and the device’s IP, nary 1 tin contradict it is so your device.
►Pictures: Try to place the device’s determination with surrounding pictures.
►Wi-Fi Neighborhood: See each progressive connections adjacent your instrumentality for amended tracking.
►Device and User Information: Check an enactment log, person immoderate modifications.

DATA SECURITY
► Remote Wipe (Pro*): Delete section files and SD connected mislaid devices to defender your privacy.
► File Retrieval (Pro*): Select and retrieve circumstantial files and debar losing enactment connected mislaid phones.

DEVICE MANAGEMENT
The Enterprise program gives entree to an upgraded level with mobile instrumentality absorption capabilities.

► Scheduled Automations (Pro*): Program recurrent, repeating oregon one-time actions.
► Enterprise Inventory (Pro*): Keep way of hardware, changes, transportation and battery.
► Fleet Status Dashboard (Pro*) : View your fleet’s presumption globally with graphic insight.
► Labels & Grouping (Pro*): Group your devices with customized labels and a robust hunt engine.

Your privateness and mobile information are our apical concern, that’s wherefore we enactment with OPEN SOURCE code. Your idiosyncratic accusation and information is lone retrieved oregon utilized erstwhile requested.

ABOUT PREY
Prey started successful 2009 arsenic a tiny tech institution with a sole purpose: helping radical support way of their devices. 13 years later, our work evolved into a trusted multi-tool for some radical and businesses. We are experts astatine tracking, protecting and managing your enactment and play tech tools. And a arrogant squad of radical consenting to enactment you.

NEED HELP?
Please interaction america astatine help@preyproject.com
Terms and Conditions: https://www.preyproject.com/terms/

(Pro*) Features included successful paid plans.

Other Apps successful This Category

Read Entire Article