Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Prey for Education, a mobile security feature-set offering developed to address the needs of K-12 and higher education environments. Co-designed with partnered schools, Prey for Education centralises and automates mobile device security management so that hard-pressed school IT staff can delegate and automate tasks and ease their workflow.

This initial feature release is designed to help schools better evaluate and track their mobile fleets and grow their device environments safely to ensure they can generate better results and promote the growth of their tech programs.

Features of Prey for Education

IT managers can also review further inventory data, such as battery and network connection per devicePrey for Education was developed in collaboration with Prey’s education customers to provide the following:

Scheduled Automations – This new capability allows managers to schedule Prey actions on their devices, such as the lock, alert, and alarm, to be executed on specific days, hours, and data ranges. For example, a curfew lock can be set from Monday to Friday at 6pm to deter out-of-hours device usage.

Reactive Security – New Control Zone Actions Triggers integrate with the Control Zone settings, Prey’s geofencing movement detection parameters, to precipitate reactions and eliminate reaction time in case of an eventuality. Users can configure Prey’s alarms, alerts, locks, and the ‘Mark as Missing’ evidence reporting feature whenever a device enters, or leaves a designated area. Specific actions can be assigned to both the entry, and exit.

Inventory Management – IT staff can now assign a user or specify a contact for each device. An Online/Offline tag has been added to provide visibility on the devices’ connection, as well as a ‘Last Seen Online’ device sorting for quick visibility. As for device status, IT managers can also review further inventory data, such as battery and network connection per device, together with the logged in user.

The multi-OS Prey for Education platform allows IT managers to group devices by class, usage, or state with custom tags

Unified Management – The multi-OS Prey for Education platform allows school IT managers to group devices by class, usage, or state with custom tags; view device status or hardware changes; and assign them to faculty or students. 

Data Privacy – An extra layer of FERPA / data privacy compliance is delivered with data wipe and retrieval reactions, and Prey’s tracking and evidence gathering are configurable to boost end-user privacy.

Promoting safe mobile environments

The Control Zone Actions and Scheduled Automations were created from the feedback our users gave us regarding their multi-tasking and high-pressure workflow. In the end, we’re trying to make their work as easy as possible. For example, they can now do things such as create digital curfews for their devices and ensure their fleet is locked up when the day ends,” said Carlos Yaconi, founder and CEO of Prey Inc.

We’re doubling down on our promise to help promote safe mobile environments for NGOs, schools, and universities, and we will continue to work with our partners to enhance and deliver new solutions for them.

Download PDF version Download PDF version
  • Related companies
  • Prey
  • View all news from
  • Prey

In case you missed it

Honeywell - how disruptive technologies make security systems better
Honeywell - how disruptive technologies make security systems better

The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years.  There is a higher demand...

Has price inflation ended (or slowed down) in the security market?
Has price inflation ended (or slowed down) in the security market?

Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It hap...

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

Quick poll
Which feature is most important in a video surveillance system?