Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
Worldwide, hundreds of satisfied customers, tens to millions of requests each day. Here today, here tomorrow. Since 2013, customers have funded the project, not VCs. Redundant EU data center, GDPR compliant. Independently monitored uptime
All API requests are encrypted with 256-bit SSL encryption. (HTTPS). Support is available 24/7. Ask us anything. Proud corporate member, OpenStreetMap Foundation. Excellent product. Many open gecoders are behind a single API. The industry's most permissive licensing. You can cache results for as long as necessary. No vendor lock-in. Results can be displayed on any map. All coverage. OpenStreetMap offers continuous updates - OpenStreetMap receives over four million edits per day. Maintaining your own system can be stressful and expensive.
Easy setup: Tutorials, SDKs, and FIPS codes for over 30 programming languages. To save engineering time, we add useful information such as calling codes, FIPS codes and speed limits.
Description
Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd.
Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
TRACKING AND LOCATION
• GPS, Wifi Triangulation, and GeoIP Tracking
• Control Zones (Geofencing)
• Global Device View
• Location History
DEVICE SECURITY
• Remote Screen Lock
• Message Alert
• Anti-mute Alarm
• Control Zone Actions
DATA SECURITY
• Remote Wipe
• File Retrieval
• Kill Switch
• Factory Reset
DEVICE MANAGEMENT
• Scheduled Automations
• Mass Actions
• Enterprise Inventory
• Custom Labels and Search
• Fleet Status Dashboard
• Custom Deployments
API Access
Has API
API Access
Has API
Integrations
Go
Google Docs
Insomnia
Java
JavaScript
Jupyter Notebook
Leaflet
MATLAB
Microsoft Excel
PHP
Integrations
Go
Google Docs
Insomnia
Java
JavaScript
Jupyter Notebook
Leaflet
MATLAB
Microsoft Excel
PHP
Pricing Details
$50 per month
Free Trial
Free Version
Pricing Details
$1.2 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
OpenCage
Founded
2015
Country
Germany
Website
opencagedata.com
Vendor Details
Company Name
Prey
Founded
2009
Country
Chile
Website
www.preyproject.com
Product Features
Asset Tracking
Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History
GIS
3D Imagery
Census Data Integration
Color Coding
Geocoding
Image Exporting
Image Management
Internet Mapping
Interoperability
Labeling
Map Creation
Map Sharing
Near-Matching
Reverse Geocoding
Spatial Analysis
Product Features
Asset Tracking
Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support