Average Ratings 1 Rating
Average Ratings 1 Rating
Description
Experience a comprehensive subscription that effortlessly integrates device management, round-the-clock support, and cloud storage, enabling your small business to efficiently oversee each employee's iPhone, iPad, and Mac throughout the process. The Collections feature streamlines setup, allowing for the automatic distribution of appropriate apps and settings tailored to employees, teams, and their devices. Each employee is provided with a dedicated iCloud account for work purposes, ensuring that storage, backup, and collaboration are both straightforward and secure. Automatic backups for work-related data on iPhones and iPads enhance convenience. With prioritized AppleCare support, you and your team can swiftly address any issues, and AppleCare also assists with tracking problems and evaluating your deployment strategy. Effortlessly assign users to new devices and reallocate old devices to new users, adapting your plans to accommodate every employee and device seamlessly. Furthermore, you have the flexibility to modify your plans at any time to meet your evolving business needs. This holistic approach ensures that your business remains agile and responsive in a fast-paced digital landscape.
Description
Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd.
Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
TRACKING AND LOCATION
• GPS, Wifi Triangulation, and GeoIP Tracking
• Control Zones (Geofencing)
• Global Device View
• Location History
DEVICE SECURITY
• Remote Screen Lock
• Message Alert
• Anti-mute Alarm
• Control Zone Actions
DATA SECURITY
• Remote Wipe
• File Retrieval
• Kill Switch
• Factory Reset
DEVICE MANAGEMENT
• Scheduled Automations
• Mass Actions
• Enterprise Inventory
• Custom Labels and Search
• Fleet Status Dashboard
• Custom Deployments
API Access
Has API
API Access
Has API
Integrations
Axonius
KACE by Quest
MSIGHTS
MojoAuth
Primo
ThreatBlockr
Umee
iCloud
Integrations
Axonius
KACE by Quest
MSIGHTS
MojoAuth
Primo
ThreatBlockr
Umee
iCloud
Pricing Details
$2.99 per device per month
Free Trial
Free Version
Pricing Details
$1.2 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Apple
Founded
1976
Country
United States
Website
www.apple.com/business/essentials/
Vendor Details
Company Name
Prey
Founded
2009
Country
Chile
Website
www.preyproject.com
Product Features
Cloud Storage
Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support
Product Features
Asset Tracking
Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support