Prey: Tracking & Security

276.1K installs
5.5K ratings
21.9K monthly active users
$<10K monthly revenue est.
IAP 100% · Ad 0%

Prey: Tracking & Security Summary

Prey: Tracking & Security is a with in-app purchases iOS app in Tools by Prey, Inc.. Released in Nov 2011 (14 years ago). It has 5.5K ratings with a 4.59★ (excellent) average. Based on AppGoblin estimates, it reaches roughly 21.9K monthly active users and generates around $<10K monthly revenue (100% IAP / 0% ads). Store metadata: updated May 1, 2026.

Recent activity: -1 new ratings this week View trends →

Data tracking: SDKs and third-party integrations were last analyzed on Apr 14, 2025.

Store info: Last updated on App Store on May 1, 2026 .


4.59★

Ratings: 5.5K

5★
4★
3★
2★
1★

Screenshots

App screenshot
App screenshot
App screenshot
App screenshot
App screenshot
App screenshot

App Description

Prey: Tracking & Security

All-in-one device fleet management
Enroll iPhones and iPads into Prey or manage your entire inventory on the go. With this iOS app, admins can monitor and secure their mobile fleet directly from their iPhone or iPad.

Unified fleet monitoring
Oversee your entire inventory regardless of the operating system. Trigger actions and track locations for devices running Android, ChromeOS, Windows, Ubuntu, and macOS, all from a single iOS dashboard.
Note on OS compatibility: To ensure the highest security standards, available features are OS-specific. Capabilities such as Kill Switch, Remote Lock, or Missing Reports vary based on the target device’s operating system and permissions.

Core capabilities
- Always-on tracking: Precise location data and Geofences with automated alerts.
- Remote security: Wipe, Lock, Reset, and Retrieve files to protect sensitive data.
- Evidence: Gather network data, photos/screenshots (opt-in), and location history.
- Fleet automation: Schedule security actions, manage device loans, and set custom team roles.
Note: Features vary by plan. Please select the plan that best suits your organization’s needs.

Security first: Authentication
To provide the highest level of protection, Prey uses password-only authentication. Requiring full credentials instead of Face-ID or Fingerprints ensures that only authorized admins can execute sensitive security commands, eliminating risks associated with biometric bypasses.

Why choose Prey?
- 15+ Years of expertise: A global leader in device recovery.
- Privacy & transparency: Open Source code ensures your data is only accessed when you explicitly request it.
- Certified protection: We are SOC2 certified, meeting the highest standards for data security.

Visit preyproject.com for more information.