Okta Integration Network

Deep, pre-built integrations to securely connect to everything
Nothing found.



Prey is a software and online platform for mobile device tracking, management, and data protection available for laptops, tablets, and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., the successor of the funding company Fork Ltd.

The Prey service is the property of Prey Inc., a small software company that operates in Chile and San Francisco. To this day, Prey has over 7.000.000 users and protects more than 8.800.000 devices in over 230 countries around the world. The service can be accessed for free, with the basic protection plan, or in its paid alternative that adds extensive features. The latter offers data protection tools for personal users, and a device fleet management suite for enterprises, schools, and non-profit organizations.

π—ͺ𝗛𝗔𝗧 𝗖𝗔𝗑 𝗬𝗒𝗨 𝗗𝗒 π—ͺπ—œπ—§π—› 𝗣π—₯π—˜π—¬?

β€’ Advanced Tracking
Follow a fleet’s movements globally, track their locations in time, and delimit Control Zones to detect and react to unwanted area exits or entries.

β€’ Reactive Security:
Create automatic triggers for when theft or movement is detected, and use anti-theft tools to block and track your organization’s assets. Recover key files, wipe or lock-down the rest, and gather evidence.

β€’ Simplified Management:
Assign devices to employees, easily group them by usage, hardware, or area, and keep track of any hardware changes or odd behaviors like devices that have been offline for a while.

β€’ Evidence-based Recoveries:
When a device is missing, Prey will gather evidence that's crucial for recovery, and deliver it to you in periodic reports that can aid the police's work.

π—™π—˜π—”π—§π—¨π—₯π—˜π—¦ 𝗕𝗬 π—–π—”π—§π—˜π—šπ—’π—₯𝗬.


β€’ GPS, Wifi Triangulation, and GeoIP Tracking
β€’ Control Zones (Geofencing)
β€’ Global Device View
β€’ Location History


β€’ Remote Screen Lock
β€’ Message Alert
β€’ Anti-mute Alarm
β€’ Control Zone Actions (Movement-triggered actions)


β€’ Remote Wipe
β€’ File Retrieval

Device Management

β€’ Scheduled Automations
β€’ Mass Actions
β€’ Enterprise Inventory
β€’ Custom Labels and Search
β€’ Fleet Status Dashboard
β€’ Custom Deployments


β€’ Pictures and Screenshots
β€’ Active and Nearby WiFis
β€’ Coordinates and Map
β€’ Device Information
β€’ Mac Address and IP

π—ͺ𝗛𝗬 π—–π—’π— π—£π—”π—‘π—œπ—˜π—¦ π—–π—›π—’π—’π—¦π—˜ 𝗣π—₯π—˜π—¬

βœ” It unifies and monitors your whole fleet seamlessly.
Organize your laptops, tablets, and mobiles in groups and follow their status and position globally. Control Zones will help detect unwanted movements that can be reviewed in time.

βœ” It adds an extra layer of data privacy compliance.
Make sure your fleet is ready to protect its data safety compliance against incidents that may put legally bound private data at risk using the platform’s custom wipe and file retrieval tools.

βœ” It reacts automatically and gathers evidence.
Configure automatic reactions upon movement detection to deter theft, and gather evidence to identify the thief. Or set up timed actions, like curfew locks to avoid usage out of office hours.