Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Prey for Education, a mobile security feature-set offering developed to address the needs of K-12 and higher education environments. Co-designed with partnered schools, Prey for Education centralizes and automates mobile device security management so that hard-pressed school IT staff can delegate and automate tasks and ease their workflow.

This initial feature release is designed to help schools better evaluate and track their mobile fleets and grow their device environments safely to ensure they can generate better results and promote the growth of their tech programs.

Features of Prey for Education

IT managers can also review further inventory data, such as battery and network connection per devicePrey for Education was developed in collaboration with Prey’s education customers to provide the following:

Scheduled Automations – This new capability allows managers to schedule Prey actions on their devices, such as the lock, alert, and alarm, to be executed on specific days, hours, and data ranges. For example, a curfew lock can be set from Monday to Friday at 6pm to deter out-of-hours device usage.

Reactive Security – New Control Zone Actions Triggers integrate with the Control Zone settings, Prey’s geofencing movement detection parameters, to precipitate reactions and eliminate reaction time in case of an eventuality. Users can configure Prey’s alarms, alerts, locks, and the ‘Mark as Missing’ evidence reporting feature whenever a device enters, or leaves a designated area. Specific actions can be assigned to both the entry, and exit.

Inventory Management – IT staff can now assign a user or specify a contact for each device. An Online/Offline tag has been added to provide visibility on the devices’ connection, as well as a ‘Last Seen Online’ device sorting for quick visibility. As for device status, IT managers can also review further inventory data, such as battery and network connection per device, together with the logged in user.

The multi-OS Prey for Education platform allows IT managers to group devices by class, usage, or state with custom tags

Unified Management – The multi-OS Prey for Education platform allows school IT managers to group devices by class, usage, or state with custom tags; view device status or hardware changes; and assign them to faculty or students. 

Data Privacy – An extra layer of FERPA / data privacy compliance is delivered with data wipe and retrieval reactions, and Prey’s tracking and evidence gathering are configurable to boost end-user privacy.

Promoting safe mobile environments

The Control Zone Actions and Scheduled Automations were created from the feedback our users gave us regarding their multi-tasking and high-pressure workflow. In the end, we’re trying to make their work as easy as possible. For example, they can now do things such as create digital curfews for their devices and ensure their fleet is locked up when the day ends,” said Carlos Yaconi, founder and CEO of Prey Inc.

We’re doubling down on our promise to help promote safe mobile environments for NGOs, schools, and universities, and we will continue to work with our partners to enhance and deliver new solutions for them.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...