다운로드 Prey Anti Theft: Find My Phone & Mobile Security - v2.2.5

다운로드 Prey Anti Theft: Find My Phone & Mobile Security - v2.2.5
Package Name com.prey
Category ,
Latest Version 2.2.5
Get it On Google Play
Update September 25, 2020 (4 years ago)

Prey Anti Theft: Find My Phone & Mobile Security - v2.2.5 또는 Vido Lyrical & Particle.ly Video Status Maker, Google Play services, Aim Tool for 8 Ball Pool, KUTO VPN - A free, fast, secure VPN, Togel Generator Nomor Jitu 2021, DroidCam - Webcam for PC, 도구 카테고리에서 가장 멋진 애플리케이션 중 하나에 대해 들어 보셨습니다.

물론 모든 게임이나 애플리케이션이 모든 휴대 전화와 호환되는 것은 아닙니다. 게임이나 애플리케이션이 기기에서 사용할 수없는 경우도 있으며 시스템 버전에 따라 다릅니다. Android 운영 체제, 화면 해상도 또는 국가 Google Play에서 액세스를 허용합니다. APKPanda는 다운로드 할 수있는 Android APK 파일을 제공하며 이러한 제한을 고수하지 않습니다.>
Prey Anti Theft: Find My Phone & Mobile Security - v2.2.5 최신 버전은 2.2.5, 출시일은 2020-09-21이며 크기는 9.0 MB입니다.Prey, Inc.에서 개발 한 Prey Anti Theft: Find My Phone & Mobile Security - v2.2.5는 Android 버전이 Android 5.0+ 이상이어야합니다. 따라서 필요한 경우 휴대 전화를 업데이트해야합니다.

약 1000 회 다운로드했습니다. 원하는 경우 Android 기기에 개별적으로 다운로드하거나 설치된 앱을 업데이트 할 수 있습니다. 앱을 업데이트하면 최신 기능에 대한 액세스 권한이 부여되고 애플리케이션 보안 및 안정성이 향상됩니다.

Prey Anti Theft: Find My Phone & Mobile Security - v2.2.5

Prey is an anti-theft, data security, and device management app with over 10 years of experience in locating lost phones, laptops, and tablets. Available for Android, Chromebooks, iOS, Windows, Linux, Ubuntu, or MAC. All devices are managed under a single account and manageable from the app itself or through the online panel at the website.

Presented in personal Anti-theft and data protection version, and its comprehensive device management alternative for enterprises.

Over 7 million users chose Prey on all platforms.

**Important**:

The Camouflage feature has been recently removed due to restrictions in the Android operating system that don't allow functionalities of such characteristics. As for the Power Button Lock feature, it only available on Android versions lower than 9. Android 9 and above include added restrictions that block this functionality.

--


Features
DEVICE LOCATION

► Control Zones: Create areas on a map that alert device movement in and out of them.
► GPS Geolocation: Pin-point accuracy reflected on a map, with GPS coordinates.
► Location History: Verify device movements in time, and detect suspicious movements.

Features
DEVICE SECURITY

► Control Zone Actions (Pro*): Activates actions when a device enters or exits an area.
► Anti-mute Alarm: Ring an alarm that can’t be muted.
► Remote Lock: Block the device’s screen with a custom passcode remotely.
► Security Message Alert: Display a message on the screen to alert the user and arrange a return.

Features
THE PREY MISSING DEVICE REPORT

The Report is Prey’s key feature. When a device is marked as missing, Prey gathers crucial evidence to aid the police’s work with:

►GPS Coordinates & Map: Ideal when pointing the police in the right direction.
►Mac Address: With this, and the device’s IP, no one can deny it is indeed your device.
►Pictures: Try to identify the device’s location with surrounding pictures.
►Wi-Fi Neighborhood: See all active connections near your device for better tracking.
►Device and User Information: Check an activity log, receive any modifications.


Features
DATA SECURITY

► Remote Wipe (Pro*): Delete local files and SD on lost devices to guard your privacy.
► File Retrieval (Pro*): Select and retrieve specific files and avoid losing work on lost phones.
► Encryption (Soon): Remotely encrypt data until the device is retrieved.

Features
DEVICE MANAGEMENT

The Enterprise plan gives access to an upgraded platform with mobile device management capabilities.

► Scheduled Automations (Pro*): Program recurrent, repeating or one-time actions.
► Enterprise Inventory (Pro*): Keep track of hardware, changes, connection and battery.
► Fleet Status Dashboard (Pro*) : View your fleet’s status globally with graphic insight.
► Labels & Grouping (Pro*): Group your devices with custom labels and a robust search engine.

Your privacy and mobile security are our top concern, that’s why we work with OPEN SOURCE code. Your personal information and data is only retrieved or used when requested.

Don’t take our word, take a look at some of our recovery stories:
★ https://preyproject.com/blog/en/recovery-stories/

ABOUT PREY
Our company was born in Chile, with an app that originated in theft itself when the founder’s laptop was stolen. After long, hard work, and many improvements, we grew to become a global solution that focuses on two missions: to help our users worry less about theft, and give them the tools to stand a chance when losing devices, and their data.

NEED HELP?
Contact us through our Social Accounts:

✔ Twitter: http://www.twitter.com/preyproject
✔ Facebook: http://www.facebook.com/preyproject
✔ Community: https://community.preyproject.com/

Terms and Conditions: https://www.preyproject.com/terms/

*Pro features are included in our paid plans: https://preyproject.com/pricing/

Please Note: This app uses the Device Administrator permission. This allows the Remote Wipe and Lock feature's function.

• We have added accessibility permission that makes sure that even if the permission to overlap app screens is removed, Prey will still block all applications before they can be opened.• You can now access your privacy information from the home screen. • You can now see more details on why we require certain permissions in order for Prey to function properly.

Show more