Resource Hub

Your one-stop IT knowledge center. Here you'll find the tools, guides & best practices for device management excellence.

Some recommendations

A practical guide for IT professionals on understanding and defending against dark web threats, featuring actionable strategies and real-world insights into credential protection

A practical guide for IT teams to understand and combat data breaches, from dark web monitoring to building robust security defenses and response plans.

Transform your school's cybersecurity with our actionable 6-step strategy. Align with NIST and CIS guidelines to protect devices, data, and foster a secure culture.

Product sheets

Explore Prey's powerful solutions. Comprehensive overview of features, benefits & pricing options.
Prey For Education

Discover Prey's comprehensive Device Security solution for Education. From Tracking to Protection, learn how to safeguard your institution's digital assets and empower safe learning.

Prey's MSP Feature Matrix

Discover Prey's comprehensive MSP solution. This feature matrix outlines tracking, security, and management capabilities designed to empower MSPs in device fleet management.

Prey's MSP Program

Explore Prey's 2024 MSP Program. Discover flexible plans, partner discounts, and co-branding opportunities designed to empower MSPs in device management and security.

Ebooks

Learn how to secure & manage devices effortlessly. Expert tips for IT Pros!
Checklist: Laptop Tracking Software for Business

Checklist designed to help businesses evaluate and select the best laptop tracking software

MDM Implementation Checklist

A step-by-step MDM checklist for SMBs to secure, manage, and monitor company devices with ease and efficiency.

A no-fear guide to the dark web secrets

A practical guide for IT professionals on understanding and defending against dark web threats, featuring actionable strategies and real-world insights into credential protection

Policies

Browse downloadable templates and real-world examples of IT security policies, from device management to data protection. Built to help you stay organized, secure, and compliant—without reinventing the wheel.

A Data Breach Response Policy defines how your org detects, contains & reports breaches—ensuring fast action, compliance & resilience.

A NIST Acceptable Use Policy sets rules for how users access & use IT systems—ensuring secure behavior, compliance & risk reduction.

A GDPR Privacy Policy explains how your org collects, uses & protects personal data—ensuring compliance, transparency & user trust.

Demos

Explore our collection of guided demos and learn how Prey can help you track and protect every endpoint. Control, monitor and locate fleets, protect devices and data and excel at administration of your organization's machines.

Let us introduce you to your panel's main page, Devices. Turn to this section to stay up to date with your fleet and learn to customize the page’s information.

Explore Prey and discover how it offers comprehensive control with its continuous device tracking capabilities.

Explore the primary sections of the Panel where you can effectively track and manage your devices' locations and activities.

Videos

Watch & learn: Device security in action! Expert tutorials, demos & tips to maximize Prey's potential.
Webinar: Prey Unboxing Spring 2024

Watch this year's first webinar: Dive into Prey's essential use cases and explore our exciting 2024 Roadmap!

Demo Tour: Inventory Management for Device Fleets

Join us and take a look at the features that help you stay tuned to your devices’ activity using global features and information.

Demo Tour: Device Loans for Work & Study

In this Demo Tour instance you will discover Prey’s role in supporting a Device Loan Program. Catch simple tools to lend, assign and recover devices.