Compare Prey and ThreatDown

At a Glance
Prey
Prey
Star Rating
(57)4.7 out of 5
Market Segments
Small-Business (53.7% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$1.30 1 device slot per month/ billed yearly
Browse all 3 pricing plans
ThreatDown
ThreatDown
Star Rating
(1,082)4.6 out of 5
Market Segments
Small-Business (47.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free Trial 1 Device Per Year
Free Trial is available
Browse all 3 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that ThreatDown excels in overall user satisfaction, boasting a significantly higher G2 Score compared to Prey. Users appreciate its comprehensive suite of features, including Email Security and Patch Management, which they find essential for managing multiple clients effectively.
  • According to verified reviews, ThreatDown's OneView dashboard is a standout feature, allowing users to monitor the status of endpoints across various sites easily. Reviewers highlight how this tool simplifies management and prioritizes endpoints that need attention, enhancing operational efficiency.
  • Users say that while Prey offers a user-friendly experience with easy installation and a straightforward interface, it falls short in overall satisfaction compared to ThreatDown. Reviewers mention that although tracking devices is efficient, the breadth of features is not as extensive as what ThreatDown provides.
  • Reviewers mention that ThreatDown's customer support is a strong point, with users noting responsive assistance and a proactive approach to product development. This contrasts with Prey, where users have reported a less favorable experience with support quality, despite its high ratings for ease of use.
  • G2 reviewers highlight that ThreatDown's recent updates and feature enhancements keep it relevant in a rapidly changing security landscape. Users appreciate the forward-thinking approach, which is crucial for maintaining security across diverse client needs, while Prey has been noted for improvements in search capabilities but lacks the same level of innovation.
  • According to recent user feedback, both products cater well to small businesses, but ThreatDown's higher volume of reviews suggests a more robust user base and reliability. Users of ThreatDown report using it daily for a wide range of security needs, while Prey, despite its strengths, has a smaller review footprint, indicating less widespread adoption.
Pricing
Entry-Level Pricing
Prey
Prey Tracking
$1.30
1 device slot per month/ billed yearly
Browse all 3 pricing plans
ThreatDown
Endpoint Protection - 14 Day Trial
Free Trial
1 Device Per Year
Browse all 3 pricing plans
Free Trial
Prey
Free Trial is available
ThreatDown
Free Trial is available
Ratings
Meets Requirements
9.1
48
9.2
968
Ease of Use
9.2
52
9.2
973
Ease of Setup
9.6
39
9.2
735
Ease of Admin
9.4
36
9.1
705
Quality of Support
9.7
44
8.8
866
Has the product been a good partner in doing business?
9.6
36
9.2
685
Product Direction (% positive)
8.8
48
8.9
958
Features by Category
Endpoint Protection PlatformsHide 12 FeaturesShow 12 Features
Not enough data
8.9
293
Administration
Not enough data
9.1
230
Not enough data
8.8
237
Not enough data
8.9
220
Not enough data
8.5
203
Not enough data
8.8
223
Functionality
Not enough data
8.9
212
Not enough data
8.9
213
Not enough data
9.0
246
Not enough data
9.6
260
Analysis
Not enough data
9.0
235
Not enough data
8.9
239
Not enough data
8.9
221
7.6
20
Not enough data
Asset Inventory
9.5
20
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Generative AI
6.3
8
Not enough data
6.3
8
Not enough data
Agentic AI - IT Asset Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
9.5
16
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
6.4
13
Not enough data
Managed Detection and Response (MDR)Hide 10 FeaturesShow 10 Features
Not enough data
8.7
130
Platform Features
Not enough data
9.1
123
Not enough data
9.2
122
Not enough data
8.9
118
Not enough data
9.2
122
Not enough data
9.3
123
Not enough data
8.7
120
Not enough data
9.5
10
Automation Capabilities
Not enough data
9.1
121
Not enough data
9.1
121
Not enough data
5.3
5
Not enough data
6.9
170
Generative AI
Not enough data
6.8
170
Not enough data
6.9
156
Endpoint ManagementHide 1 FeatureShow 1 Feature
7.4
7
7.4
115
Generative AI
7.4
7
7.4
115
Endpoint Detection & Response (EDR)Hide 1 FeatureShow 1 Feature
Not enough data
9.7
13
Services - Endpoint Detection & Response (EDR)
Not enough data
9.7
13
Mobile Data SecurityHide 9 FeaturesShow 9 Features
7.9
8
Not enough data
Compliance
9.3
7
Not enough data
9.4
8
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Protection
7.9
8
Not enough data
7.7
8
Not enough data
6.2
7
Not enough data
7.1
8
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Mobile Device Management (MDM)Hide 18 FeaturesShow 18 Features
9.3
23
Not enough data
Platform - Mobile Device Management (MDM)
Feature Not Available
Not enough data
Operating System
9.4
20
Not enough data
9.1
20
Not enough data
9.5
17
Not enough data
Management
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.0
20
Not enough data
Security
9.8
22
Not enough data
9.2
21
Not enough data
Agentic AI - Mobile Device Management (MDM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Prey
Prey
ThreatDown
ThreatDown
Prey and ThreatDown are categorized as Endpoint Management
Reviews
Reviewers' Company Size
Prey
Prey
Small-Business(50 or fewer emp.)
53.7%
Mid-Market(51-1000 emp.)
40.7%
Enterprise(> 1000 emp.)
5.6%
ThreatDown
ThreatDown
Small-Business(50 or fewer emp.)
47.0%
Mid-Market(51-1000 emp.)
41.1%
Enterprise(> 1000 emp.)
11.8%
Reviewers' Industry
Prey
Prey
Information Technology and Services
20.4%
Consulting
5.6%
Computer & Network Security
5.6%
Computer Software
5.6%
Higher Education
5.6%
Other
57.4%
ThreatDown
ThreatDown
Information Technology and Services
12.8%
Computer & Network Security
7.0%
Construction
4.6%
Computer Software
4.4%
Education Management
4.0%
Other
67.3%
Alternatives
Prey
Prey Alternatives
Absolute Secure Endpoint
Absolute Secure Endpoint
Add Absolute Secure Endpoint
NinjaOne
NinjaOne
Add NinjaOne
Iru
Iru
Add Iru
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
ThreatDown
ThreatDown Alternatives
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint...
Add CrowdStrike Falcon Endpoint Protection Platform
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
SentinelOne Singularity Endpoint
SentinelOne Singularity...
Add SentinelOne Singularity Endpoint
Sophos Endpoint
Sophos Endpoint
Add Sophos Endpoint
Discussions
Prey
Prey Discussions
Monty the Mongoose crying
Prey has no discussions with answers
ThreatDown
ThreatDown Discussions
Is Malwarebytes enough for your computer to be 100% secure?
5 Comments
Surabhi P.
SP
Malware bytes Premium & End-Point Protection provides Protection from Viruses, Malware, Ransomware-type of malware, Adware,Spyware,Trojans, PUPs, PUMs,...Read more
What is malwarebytes tray application?
4 Comments
Nicolas G.
NG
You don't need any anti-virus/malware protection on your mac if it isn't too old? Read more
Using Malwarebytes EDR in a midsize company needs extra investment for web filter?
4 Comments
RH
The MB web detections works great against malware, but maybe for the midsize companies, instead for a perimeter investment besides the firewall, the MB can...Read more