Related Products
  | 
            
            ||||||
                
            
            
            About
            Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more. 
             
            
        
         | 
        
        
                
            
            
            About
            Prey is a cross-platform Device Tracking & Security tool to stay in control of remote assets.  Mobile device tracking, management, and data protection available for laptops, tablets and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., successor of the funding company Fork Ltd.
Prey started in 2009 as a small tech company with a sole purpose: helping people keep track of their devices. 13 years later, our service evolved into a trusted multi-tool for both people and businesses. It's a service that protects over 8 million devices and their data every day, all around the world. We are experts at tracking, protecting and managing your work and play tech tools. And a proud team of people willing to support you.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Companies that want to protect their data
         
        
    
         | 
        
        
                
            
        
        Audience
        Organizations, SMB, MSP, Education, Government, NGO
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        No information available.
        
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        $1.2 per month
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
         | 
        
        
                
            
        
    
        
Reviews/
        
    
    
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationNext DLP 
    
    Founded: 2016 
    
    United Kingdom 
    www.nextdlp.com/platform 
         | 
        
        
                
            
        
        Company InformationPrey 
    
    Founded: 2009 
    
    Chile 
    www.preyproject.com 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        ||||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
                
                Endpoint Detection and Response (EDR) Features
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Blacklisting/Whitelisting
            
            
         
        
    
        
        
            
                Continuous Monitoring
            
            
         
        
    
        
        
            
                Malware/Anomaly Detection
            
            
         
        
    
        
        
            
                Prioritization
            
            
         
        
    
        
        
            
                Remediation Management
            
            
         
        
    
        
        
            
                Root Cause Analysis
            
            
         
        
    
                    Endpoint Protection Features
            
                Activity Log
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Device Management
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Signature Matching
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Cybersecurity Features
            
                AI / Machine Learning
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                IOC Verification
            
            
         
        
    
        
        
            
                Tokenization
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Data Loss Prevention Features
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Incident Management
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Sensitive Data Identification
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Vulnerability Management Features
            
                Asset Discovery
            
            
         
        
    
        
        
            
                Asset Tagging
            
            
         
        
    
        
        
            
                Network Scanning
            
            
         
        
    
        
        
            
                Patch Management
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Prioritization
            
            
         
        
    
        
        
            
                Risk Management
            
            
         
        
    
        
        
            
                Vulnerability Assessment
            
            
         
        
    
        
        
            
                Web Scanning
            
            
         
        
    
                     | 
        
        
                
            
        
    
        
            
            
        
            
            
                
                Endpoint Protection Features
            
                Activity Log
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Device Management
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Signature Matching
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Whitelisting / Blacklisting
            
            
         
        
    
                    Asset Tracking Features
            
                Activity Tracking
            
            
         
        
    
        
        
            
                Audit Trails
            
            
         
        
    
        
        
            
                Barcoding / RFID
            
            
         
        
    
        
        
            
                Checkout / Check-In
            
            
         
        
    
        
        
            
                Depreciation Tracking
            
            
         
        
    
        
        
            
                Disposal Tracking
            
            
         
        
    
        
        
            
                Inventory Management
            
            
         
        
    
        
        
            
                Location Tracking
            
            
         
        
    
        
        
            
                QR Codes
            
            
         
        
    
        
        
            
                Reservations
            
            
         
        
    
        
        
            
                Service History
            
            
         
        
    
                    Data Security Features
            
                Alerts / Notifications
            
            
         
        
    
        
        
            
                Antivirus/Malware Detection
            
            
         
        
    
        
        
            
                At-Risk Analysis
            
            
         
        
    
        
        
            
                Audits
            
            
         
        
    
        
        
            
                Data Center Security
            
            
         
        
    
        
        
            
                Data Classification
            
            
         
        
    
        
        
            
                Data Discovery
            
            
         
        
    
        
        
            
                Data Loss Prevention
            
            
         
        
    
        
        
            
                Data Masking
            
            
         
        
    
        
        
            
                Data-Centric Security
            
            
         
        
    
        
        
            
                Database Security
            
            
         
        
    
        
        
            
                Encryption
            
            
         
        
    
        
        
            
                Identity / Access Management
            
            
         
        
    
        
        
            
                Logging / Reporting
            
            
         
        
    
        
        
            
                Mobile Data Security
            
            
         
        
    
        
        
            
                Monitor Abnormalities
            
            
         
        
    
        
        
            
                Policy Management
            
            
         
        
    
        
        
            
                Secure Data Transport
            
            
         
        
    
        
        
            
                Sensitive Data Compliance
            
            
         
        
    
                    Mobile Device Management (MDM) Features
            
                Automatic Device Recognition
            
            
         
        
    
        
        
            
                Data Management
            
            
         
        
    
        
        
            
                Deployment Management
            
            
         
        
    
        
        
            
                Inventory Management
            
            
         
        
    
        
        
            
                Maintenance Utilities
            
            
         
        
    
        
        
            
                Procurement Management
            
            
         
        
    
        
        
            
                Remote Update / Installation
            
            
         
        
    
        
        
            
                Software Management
            
            
         
        
    
        
        
            
                Synchronization Management
            
            
         
        
    
        
        
            
                Wireless Network Support
            
            
         
        
    
                     | 
        |||||
                
            
        
    
        Integrations
                
    
                
                    No info available.
                
             
            
             | 
        
        
                
            
        
    
        Integrations
                
    
                
                    No info available.
                
             
            
             | 
        |||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |