Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
G2 recognized Prey
Prey

By Prey Project

4.7 out of 5 stars

How would you rate your experience with Prey?

Prey Pricing Overview

Free Trial
Download complete pricing listDownloadDownload now

Prey Pricing Reviews

(2)
IA
i.t. Administrator
Small-Business (50 or fewer emp.)
"PreyProject Tracks, Protects, and Delivers"
What do you like best about Prey?

Multi-Device Protection – You can track laptops, phones, and tablets all under one account.

Cross-Platform Support – Works on Windows, macOS, Linux, Android, and iOS.

Location Tracking – Pinpoints lost/stolen devices with GPS, Wi-Fi triangulation, and even nearby networks.

Theft Recovery Tools – Lets you trigger alarms, lock devices, and even capture photos of whoever has it.

Data Protection – You can wipe sensitive files remotely to protect your privacy.

Easy Dashboard – Clean, web-based control panel for managing multiple devices.

Open Source Roots – Originally started as an open-source project, making it community-trusted.

Affordable Plans – Compared to competitors, Prey offers strong features at a lower cost.

Proven Success Stories – Documented recoveries of stolen laptops and phones thanks to Prey. Review collected by and hosted on G2.com.

What do you dislike about Prey?

One drawback of PreyProject is that its recovery and tracking tools only work once the lost device connects to the internet. Until then, the system can’t update the device’s location or send commands, which can cause delays if the thief keeps the device offline. Review collected by and hosted on G2.com.

Bruce A. S.
BS
Adjunct Professor
Mid-Market (51-1000 emp.)
"Prey keeps our devices safe, secure, and trackable!"
What do you like best about Prey?

Prey allows us to know what is happening with our mobile devices in one web interface - and find the when we need to. The cost is great for a small company like ours. Review collected by and hosted on G2.com.

What do you dislike about Prey?

Because it is a software layer, it is possible to bypass it if someone knows it is there, and knows what to do. But it isn't easy, and we still know when/where it happens. Review collected by and hosted on G2.com.

Prey Comparisons
Product Avatar Image
Absolute Secure Endpoint
Compare Now
Product Avatar Image
Lookout
Compare Now
Product Avatar Image
Esker
Compare Now
Product Avatar Image
Product Avatar Image
Prey