Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Prey Features

What are the features of Prey?

Operating System

  • Multi-Systems Support
  • Apple Support
  • Android Support

Management

  • Usage Information
  • Central Dashboard
  • Integrations

Security

  • Remote Wipe
  • Security

Asset Inventory

  • Hardware Asset Inventory

Top Rated Prey Alternatives

Filter for Features

Compliance

Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

Not enough data

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

Not enough data

Protection

Data Encryption

Provide some level of encryption of data at rest, protecting sensitive data while it lives on a mobile device.

Not enough data

Data Transport

Protects data with some form of encryption as it leaves your secure or local network.

Not enough data

Mobile VPN

Provides a virtual private network (VPN) to secure remote access to networks

Not enough data

Backup

Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.

Not enough data

Attacks

Defends against threats such as phishing attempts, jailbreaking, man-in-the-middle (MITM) attacks, and malicious third-party applications.

Not enough data

Operating System

Multi-Systems Support

Supports differing operating systems and mobile devices This feature was mentioned in 16 Prey reviews.
93%
(Based on 16 reviews)

Apple Support

Based on 15 Prey reviews. Supports Apple devices
90%
(Based on 15 reviews)

Android Support

Based on 13 Prey reviews. Support Android devices
94%
(Based on 13 reviews)

Management

Usage Information

Based on 14 Prey reviews. Offers visibility into employee mobile device activity
86%
(Based on 14 reviews)

Central Dashboard

Based on 11 Prey reviews. Provide immediate insights, information, and updates on IT assets from a central dashboard.
92%
(Based on 11 reviews)

Integrations

Integrate with other software solutions, such as spend management and software asset management. 10 reviewers of Prey have provided feedback on this feature.
72%
(Based on 10 reviews)

Security

Remote Wipe

Enable the remote locking down and encryption of employee mobile devices This feature was mentioned in 16 Prey reviews.
97%
(Based on 16 reviews)

Security

As reported in 15 Prey reviews. Protects employee, company, and data from potential vulnerabilities or malware
92%
(Based on 15 reviews)

Asset Inventory

Hardware Asset Inventory

As reported in 14 Prey reviews. Create an inventory of a company's hardware assets.
93%
(Based on 14 reviews)