Prey Features
What are the features of Prey?
Operating System
- Multi-Systems Support
- Apple Support
- Android Support
Management
- Usage Information
- Central Dashboard
- Integrations
Security
- Remote Wipe
- Security
Asset Inventory
- Hardware Asset Inventory
Top Rated Prey Alternatives
(16)
4.9 out of 5
Visit Website
Sponsored
Prey Categories on G2
Filter for Features
Compliance
Multi-Factor Authentication | Requires a second level of authentication, such as sms messaging or customized tokens, to access data. | Not enough data | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data |
Protection
Data Encryption | Provide some level of encryption of data at rest, protecting sensitive data while it lives on a mobile device. | Not enough data | |
Data Transport | Protects data with some form of encryption as it leaves your secure or local network. | Not enough data | |
Mobile VPN | Provides a virtual private network (VPN) to secure remote access to networks | Not enough data | |
Backup | Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster. | Not enough data | |
Attacks | Defends against threats such as phishing attempts, jailbreaking, man-in-the-middle (MITM) attacks, and malicious third-party applications. | Not enough data |
Operating System
Multi-Systems Support | Supports differing operating systems and mobile devices This feature was mentioned in 16 Prey reviews. | 93% (Based on 16 reviews) | |
Apple Support | Based on 15 Prey reviews. Supports Apple devices | 90% (Based on 15 reviews) | |
Android Support | Based on 13 Prey reviews. Support Android devices | 94% (Based on 13 reviews) |
Management
Usage Information | Based on 14 Prey reviews. Offers visibility into employee mobile device activity | 86% (Based on 14 reviews) | |
Central Dashboard | Based on 11 Prey reviews. Provide immediate insights, information, and updates on IT assets from a central dashboard. | 92% (Based on 11 reviews) | |
Integrations | Integrate with other software solutions, such as spend management and software asset management. 10 reviewers of Prey have provided feedback on this feature. | 72% (Based on 10 reviews) |
Security
Remote Wipe | Enable the remote locking down and encryption of employee mobile devices This feature was mentioned in 16 Prey reviews. | 97% (Based on 16 reviews) | |
Security | As reported in 15 Prey reviews. Protects employee, company, and data from potential vulnerabilities or malware | 92% (Based on 15 reviews) |
Asset Inventory
Hardware Asset Inventory | As reported in 14 Prey reviews. Create an inventory of a company's hardware assets. | 93% (Based on 14 reviews) |