BlackBerry Cyber SuiteBlackBerry 
                        
                        
                     | 
        
        ||||||
Related Products
  | 
            
            ||||||
                
            
            
            About
            Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working?  In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption.
             
            
        
         | 
        
        
                
            
            
            About
            Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets.  Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd.
Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. It's a service that protects over 8 million devices and their data every day, all around the world. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Businesses looking for a cybersecurity solution to avoid breaches and safeguard against threats with advanced AI
         
        
    
         | 
        
        
                
            
        
        Audience
        Organizations, SMB, MSP, Education, Government, NGO
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        $1.2 per month
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
         | 
        
        
                
            
        
    
        
Reviews/
        
    
    
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationBlackBerry 
    
    Founded: 1984 
    
    Canada 
    www.blackberry.com/us/en/products/blackberry-cyber-suite 
         | 
        
        
                
            
        
        Company InformationPrey 
    
    Founded: 2009 
    
    Chile 
    www.preyproject.com 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
        
            
            
                
                Endpoint Protection Features
            
                Activity Log
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Device Management
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Signature Matching
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Asset Tracking Features
            
                Activity Tracking
            
            
         
        
    
        
        
            
                Audit Trails
            
            
         
        
    
        
        
            
                Barcoding / RFID
            
            
         
        
    
        
        
            
                Checkout / Check-In
            
            
         
        
    
        
        
            
                Depreciation Tracking
            
            
         
        
    
        
        
            
                Disposal Tracking
            
            
         
        
    
        
        
            
                Inventory Management
            
            
         
        
    
        
        
            
                Location Tracking
            
            
         
        
    
        
        
            
                QR Codes
            
            
         
        
    
        
        
            
                Reservations
            
            
         
        
    
        
        
            
                Service History
            
            
         
        
    
                    Data Security Features
            
                Alerts / Notifications
            
            
         
        
    
        
        
            
                Antivirus/Malware Detection
            
            
         
        
    
        
        
            
                At-Risk Analysis
            
            
         
        
    
        
        
            
                Audits
            
            
         
        
    
        
        
            
                Data Center Security
            
            
         
        
    
        
        
            
                Data Classification
            
            
         
        
    
        
        
            
                Data Discovery
            
            
         
        
    
        
        
            
                Data Loss Prevention
            
            
         
        
    
        
        
            
                Data Masking
            
            
         
        
    
        
        
            
                Data-Centric Security
            
            
         
        
    
        
        
            
                Database Security
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Identity / Access Management
            
            
         
        
    
        
        
            
                Logging / Reporting
            
            
         
        
    
        
        
            
                Mobile Data Security
            
            
         
        
    
        
        
            
                Monitor Abnormalities
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Secure Data Transport
            
            
         
        
    
        
        
            
                Sensitive Data Compliance
            
            
         
        
    
                    Mobile Device Management (MDM) Features
            
                Automatic Device Recognition
            
            
         
        
    
        
        
            
                Data Management
            
            
         
        
    
        
        
            
                Deployment Management
            
            
         
        
    
        
        
            
                Inventory Management
            
            
         
        
    
        
        
            
                Maintenance Utilities
            
            
         
        
    
        
        
            
                Procurement Management
            
            
         
        
    
        
        
            
                Remote Update / Installation
            
            
         
        
    
        
        
            
                Software Management
            
            
         
        
    
        
        
            
                Synchronization Management
            
            
         
        
    
        
        
            
                Wireless Network Support
            
            
         
        
    
                     | 
        ||||||
                
            
        
    
        Integrations
            
                
    SecuSUITE
            
            
         
        
    
                
             | 
        ||||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |