Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets. Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd.
Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
TRACKING AND LOCATION
• GPS, Wifi Triangulation, and GeoIP Tracking
• Control Zones (Geofencing)
• Global Device View
• Location History
DEVICE SECURITY
• Remote Screen Lock
• Message Alert
• Anti-mute Alarm
• Control Zone Actions
DATA SECURITY
• Remote Wipe
• File Retrieval
• Kill Switch
• Factory Reset
DEVICE MANAGEMENT
• Scheduled Automations
• Mass Actions
• Enterprise Inventory
• Custom Labels and Search
• Fleet Status Dashboard
• Custom Deployments
Description
With the impending surge in the number of connected devices projected to reach billions, the importance of remotely controlling and managing these devices will significantly increase. The IoT Remote Device Management system simplifies the secure onboarding, organization, monitoring, and management of IoT devices on a large scale. eInfochips brings over twenty years of experience in handling devices throughout their life cycle, catering to numerous business scenarios across diverse industries. Our established expertise in technology, processes, and infrastructure across the IoT value chain enables clients to effectively extend their Cloud applications for seamless integration and management of devices. The Remote Device Management platform offered by eInfochips has empowered customers to elevate the value of their applications by incorporating devices, ensuring high service reliability, lowering operational costs, and maximizing device availability. Furthermore, we have collaborated closely with clients to facilitate bulk operations on numerous devices at once, streamlining their management processes even further. This collaboration has proven essential in adapting to the rapidly evolving landscape of IoT technology.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Cadence
Microsoft 365
NVIDIA DRIVE
Tricentis LiveCompare
Integrations
Amazon Web Services (AWS)
Cadence
Microsoft 365
NVIDIA DRIVE
Tricentis LiveCompare
Pricing Details
$1.2 per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Prey
Founded
2009
Country
Chile
Website
www.preyproject.com
Vendor Details
Company Name
einfochips
Founded
1995
Country
United States
Website
www.einfochips.com/services/digital-engineering/remote-device-management/
Product Features
Asset Tracking
Activity Tracking
Audit Trails
Barcoding / RFID
Checkout / Check-In
Depreciation Tracking
Disposal Tracking
Inventory Management
Location Tracking
QR Codes
Reservations
Service History
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Mobile Device Management (MDM)
Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support