Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Kandji Reviews & Ratings
    1,302 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • Syncro Reviews & Ratings
    451 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,336 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    3,441 Ratings
    Company Website
  • Action1 Reviews & Ratings
    634 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    386 Ratings
    Company Website
  • ConnectWise Automate Reviews & Ratings
    502 Ratings
    Company Website
  • Huntress Reviews & Ratings
    819 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website

What is Prey?

Prey is a versatile tool for tracking and securing devices across multiple platforms, ensuring users maintain control over their remote assets efficiently. It provides comprehensive tracking, management, and data protection services for laptops, tablets, and smartphones, catering to both individual and business needs. Developed by Prey Inc., a Chilean firm that succeeded Fork Ltd., the software has been designed to adapt to the ever-evolving landscape of technology use. Since its inception in 2009, Prey has transformed from a modest tech startup focused solely on device tracking into a trusted all-in-one solution for protecting and managing technology in both personal and professional settings. The dedicated team at Prey is committed to providing exceptional support and expertise in the realm of device security. TRACKING AND LOCATION • GPS, Wifi Triangulation, and GeoIP Tracking • Control Zones (Geofencing) • Global Device View • Location History DEVICE SECURITY • Remote Screen Lock • Message Alert • Anti-mute Alarm • Control Zone Actions DATA SECURITY • Remote Wipe • File Retrieval • Kill Switch • Factory Reset DEVICE MANAGEMENT • Scheduled Automations • Mass Actions • Enterprise Inventory • Custom Labels and Search • Fleet Status Dashboard • Custom Deployments The various features offered by Prey make it an indispensable resource for anyone looking to enhance their device security and management capabilities.

What is Microsoft Intune?

Transform the way IT services are delivered within your modern workplace setting. Achieve a streamlined approach to managing contemporary workplace operations and propel digital transformation initiatives by leveraging Microsoft Intune. Create a dynamic Microsoft 365 ecosystem that allows users to work on their chosen devices and applications, all while maintaining robust data protection. Securely manage a wide array of devices, including iOS, Android, Windows, and macOS, through a cohesive endpoint management solution. Boost the efficiency of deployment processes, provisioning, policy enforcement, app distribution, and updates by utilizing advanced automation techniques. Sustain a state-of-the-art, scalable cloud service framework that operates globally to ensure your systems remain up to date. Harness the capabilities of the intelligent cloud to derive crucial insights and set benchmarks for your security policies and configurations. Effectively safeguard sensitive information, particularly when employees or partners use devices that are not directly overseen by your organization to access work-related data. With Intune's app protection policies, you can exercise precise control over Office 365 information on mobile devices, thus upholding compliance and security standards. By embracing these advanced solutions, organizations can forge a resilient digital landscape that evolves alongside the changing demands of their workforce, ensuring adaptability and sustainability. Ultimately, this strategic approach not only enhances productivity but also reinforces the integrity of organizational data.

Media

Media

Integrations Supported

ALVAO Asset Management
Azure Marketplace
Azure Service Fabric
BlueTally
CyberQP
Eclypsium
F5 BIG-IP Access Policy Manager
Hypergate Files
Hyperproof
Keyfactor Command for IoT
Keyfactor EJBCA
Microsoft Cloud App Security
Network Glue
Panaseer
Prosimo
Reftab
Scrut Automation
Teamstack
runZero

Integrations Supported

ALVAO Asset Management
Azure Marketplace
Azure Service Fabric
BlueTally
CyberQP
Eclypsium
F5 BIG-IP Access Policy Manager
Hypergate Files
Hyperproof
Keyfactor Command for IoT
Keyfactor EJBCA
Microsoft Cloud App Security
Network Glue
Panaseer
Prosimo
Reftab
Scrut Automation
Teamstack
runZero

API Availability

Has API

API Availability

Has API

Pricing Information

$1.2 per month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Prey

Date Founded

2009

Company Location

Chile

Company Website

www.preyproject.com

Company Facts

Organization Name

Microsoft

Date Founded

1975

Company Location

United States

Company Website

www.microsoft.com/en-us/microsoft-365/enterprise-mobility-security/microsoft-intune

Categories and Features

Asset Tracking

Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Categories and Features

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Popular Alternatives

Popular Alternatives

ConnectWise RMM Reviews & Ratings

ConnectWise RMM

ConnectWise