Prey Software Secures Mobile Devices for 23 New Education Customers

Total Page:16

File Type:pdf, Size:1020Kb

Prey Software Secures Mobile Devices for 23 New Education Customers Source : Prey, Inc. 06 déc. 2017 09h00 HE Prey Software Secures Mobile Devices for 23 New Education Customers Chromebook Beta Launch supports 54 Chromebooks; Academic institutions turn to Prey Anti-Theft to lock down mobile device fleets SAN FRANCISCO, Dec. 06, 2017 (GLOBE NEWSWIRE) -- Prey Software, provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, today announced that 23 new education institutions have licensed Prey Anti-Theft to protect more than 7800 mobile devices over the past year. A cost-effective way to track and find stolen devices, Prey Anti-Theft is used by more than 154 academic organizations worldwide. Prey also launched Beta support for Chromebooks, with protection for all 54 Chromebooks that support apps from the Google Play™ store. Mobile devices are proliferating in both public school systems and on college campuses, and all indications are that those numbers will continue to rise. Of those devices, the low-cost Chromebook, with its open source Google Chrome OS™ running the Google Cloud-based application suite, is becoming ubiquitous in schools. With the addition of compatibility for 20 more Chromebooks this year, Prey Anti-Theft software can be downloaded to protect all Chromebooks with support for the Google Play platform. Prey Anti-Theft is ideal for education because its open source platform ensures that the product’s price tag is in line with budgets, with simple means to establish policies that prevent the loss or theft of mobile computing devices. Prey’s multi-device management capabilities enable school IT departments to track and control fleets big and small--from 30 devices in a single computer lab, to complex school district fleets. Students can also protect their phones and additional personal devices with the free consumer version of Prey. Prey Anti-Theft also benefits schools with: Geofencing and File Retrieval Capabilities – help secure devices before they can be lost or stolen, while advanced search, labeling, and mass action tools enable organizations to track and control in environments with 30 or more devices. Multi-device Management – Prey’s new mass management capabilities streamline oversight of the mobile environment with: Mass Actions Controls – Trigger messages or alarms on thousands of devices to alert users to actions, such as returning laptops at the end of a test, or turning in a device at the end of a shift. Advanced Search and Labels – Organize entire fleets of mobile devices with a versatile search engine and customizable tags that make it simple to manage groups within universities, hospitals, enterprise and government. Anti-theft Prevention – With the ability to monitor and protect devices and prevent them from ever being lost or stolen in the first place, Prey offers: Control Zones – Leveraging geofencing technology, Prey creates GPS-secured zones within a building, campus or city. Real-time notifications alert managers whenever a device leaves or enters an area for full control over the whereabouts of an entire fleet of devices. By monitoring devices proactively, Prey frees up resources to perform other tasks. Remote File Retrieval & Wipe – Enables the retrieval and/or deletion of sensitive information via email with a download link of data once a lost or stolen device comes online. “We are seeing an increasing demand from schools for our affordable, flexible and platform agnostic security solution for mobile devices,” said Carlos Yaconi, co-founder and CEO at Prey Software. “What might have been a ‘nice to have’ a year ago is now a ‘must have’ for these school IT administrators.” New Prey Education customers include: Aspira Inc of Illinois, Boost Collaborative, Broken Arrow Public Schools, Carol Morgan School, Coolum Beach Christian College, Euroweb Internet GmbH, Front Range Community College, Hobart & William Smith Colleges, International School of Moscow, Lakeshore Technical College, Loyola High School, Methodist College, Oxford School District, Redding School of the Arts, Sandusky City Schools, Seton Hill University, Six Nations Polytechnic, St. Vincent High School, The Governor Morehead School for the Blind, Trinity Episcopal School, United Nations University, Wahoo Public Schools, Wesleyan University. Pricing & Availability Prey Software offers a 30 percent discount to educational organizations. Pricing for Prey for Education is based on the number of devices. It begins at .70 cents per device, all features included, for low-scale deployments; as the number of devices increases, the per-device price continues to go down. Available for all major platforms: iOS, Android, Linux, Ubuntu, Windows and MacOS. Additional Resources Read about the Prey Chromebook Beta Launch, including a list of the 54 Chromebooks that Prey Anti-Theft can protect: https://www.preyproject.com/en/blog/device-diversity-now-chromebook-ready Learn how the Carol Morgan School is taking full advantage of Prey Anti-Theft to manage its fleet of mobile devices: https://www.preyproject.com/en/blog/education/device-security-in-education-carol-morgan-school About Prey Software Prey Software is the only provider of anti-theft solutions for tracking and protecting mobile devices that can manage and secure all of an organization’s mobile devices from the same place. Installed on more than 8 million devices worldwide, Prey’s cross-platform, open source security solution consolidates mobile device management on a single account, no matter how many different device manufacturers or operating system need to be tracked. Find out more at www.preyproject.com. Media Contact Mike Schultz Cavalier Communications Phone: 978-496-1012 [email protected].
Recommended publications
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • Mac Stolen Software
    Mac stolen software click here to download Many people we know have had their Macs stolen, often in 'safe' situations. Undercover was the world's first theft-recovery software to send screenshots of. Oct 5, With Find My Mac, you can locate and protect your Mac if it's ever lost or stolen. To use Find My Mac, simply turn it on in System Preferences. If your computer is lost or stolen, Hidden will show you where it is and who has it. Recommended by experts. Money back guarantee. Sep 5, But you can be prepared to recover Mac just in case you lost. When you consider Mac Theft Preventing Software, “Find My Mac” app will pop. Jun 24, We listed best Mac Tracking Apps and you must have one of them on your Mac This app is a feature loaded anti- theft software that's not even. Find your iphone, android, laptops & tablet when stolen or missing. Mobile Android, Windows, Linux, Chrome OS, iOS, macOS, laptops, tablets, and mobiles . Sep 9, An Iowa City police officer plans to exhibit software which could help law enforcement track down stolen devices. On Tuesday, local media. GadgetTrak provides anti-theft software for Mac laptops. Read true stories of real people who retrieved their stolen Macs with MacKeeper ™ Anti-theft feature. Feb 20, Flipcode's Hidden “boasts the most advanced theft tracking software for your Mac .” I tested Hidden on my desktop computer, an iMac. Apr 25, Having your Mac get stolen might seem like the end of the world, but there are some steps you can take to try and get it back, or failing that.
    [Show full text]
  • Games Made in Texas (1981 – 2021) Page 1 of 17
    Games Made in Texas (1981 – 2021) Page 1 of 17 Release Date Name Developer Platform Location 2021-01-02 Yes! Our Kids Can Video Game - Third Grade Yes! Our Kids Can San Antonio Magnin & Associates (Magnin iOS, Android, Apple TV, 2020-09-30 Wheelchair Mobility Experience Games) Mac, PC, Xbox One Dallas; Richardson 2020-09-17 Shark Tank Tycoon Game Circus, LLC Addison Stadia currently; Steam / 2020-07-13 Orcs Must Die! 3 Robot Entertainment Xbox / PlayStation in 2021 Plano 2019-12-31 Path of the Warrior (VR) Twisted Pixel Games Austin 2019-10-29 Readyset Heroes Robot Entertainment, Inc. Mobile Plano Xbox One, Playstation 4, 2019-09-13 Borderlands 3 Gearbox Software PC Frisco 2019-08-13 Vicious Circle Rooster Teeth Austin 2019-08-01 Stranger Things 3 BonusXP Nintendo Switch Allen 2019-07-11 Defector Twisted Pixel Games Oculus Rift Austin Android, PlayStation 4, Nintendo Switch, Xbox One, iOS, Microsoft 2019-06-28 Fortnight Phase 2 Armature Studio Windows, Mac, Mobile Austin Microsoft Windows & 2019-06-21 Dreadnought 2 Six Foot Games PlayStation 4 Houston 2019-05-31 Sports Scramble Armature Studio Oculus Quest Austin 2019-05-02 Duck Game Armature Studio Nintendo Switch Austin 2019-03-15 Zombie Boss Boss Fight Entertainment, Inc Allen; McKinney Windows (Steam); Oculus 2018-12-31 Baby Hands Chicken Waffle Rift Austin 2018-12-31 Baby Hands Jr. Chicken Waffle iOS; Android Austin 2018-12-19 Arte Lumiere Triseum Microsoft Windows Bryan 2018-11-15 Dreadnought 1: Command The Colossal Six Foot, LLC Houston 2018-10-10 World Armature Studio LLC Austin 2018-10-05 Donkey Kong Country: Tropical Freeze Retro Studios Austin Windows (Steam); HTC 2018-08-27 Torn Aspyr Media Inc.
    [Show full text]
  • Tracking Stolen Android Phones System ﻧظﺎم ﺗﻌﻘب اﺟﮭزة
    SUDAN UNIVERSITY OF SCIENCE AND TECHNOLOGY FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY TRACKING STOLEN ANDROID PHONES SYSTEM نظام تعقب اجهزة اﻻندرويد المسروقة A THESIS SUBMITED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS OF B.Sc. (HONOR) DEGREE IN SOFTWARE ENGINEERING OCTOBER 2015 بسن هللا الرحمن الرحين SUDAN UNIVERSITY OF SCIENCE AND TECHNOLOGY FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY SOFTWARE ENGINEERING DERARTMENT TRACKING STOLEN ANDROID PHONES A THESIS SUBMITED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS OF B.Sc. (HONOR) DEGREE IN SOFTWARE ENGINEERING PREPARED BY: NASHWA TAJ EL-DEAN OSMAN SARA MOHAMMED AL-NOOR TASNEEM MOHAMMED ALI SIGNITURE OF SUPERVISOR: AL-SHARIF HAGO AL-MOGADAM …………… DATE /OCTOBER/2015 اٟٝح قاه ذؼاىٚ: ﴿ َو َما تَ ْوفِي ِقي إِ اَّل بِا ا َِّلل ۚ َعلَ ْي ِه تَ َو اك ْل ُت َوإِلَ ْي ِه أُنِي ُب ﴾ ٕ٘د اﻻٝح 88 i اىحَذ هلل اىحَذ هلل ا ّىزٛ تؼ ّضذٔ ٗجﻻىٔ ذر ٌّ اىصاىحاخ، ٝا س ّب ىل اىحَذ مَا ْٝثغٜ ىجﻻه ٗجٖل ٗىؼظٌٞ سيطاّل، اىيٖ ٌّ اغفش ىْا ٗاسحَْا ٗاسض ػ ّْا، ٗذقثّو ٍ ّْا ٗأدخاّا اىج ّْح ّٗ ّجْا ٍِ اى ّْاس، ٗأصيح ىْا شأّْا م ّئ، اىيٖ ٌّ أحسِ ػاقثرْا فٜ اﻷٍ٘س م ّيٖا، ٗأجشّا ٍِ خضٛ اىذّّٞا ػٗزاب اٟخشج، اىيٖ ٌّ ٝا ٍِ أظٖش اىجَٞو ٗسرش اىقثٞح، ٝا ٍِ ﻻ ٝؤاخز تاىجشٝشج ٗﻻ ٖٝرل اىسرش، ٝا ػظٌٞ اىؼف٘ ٗحسِ اىرجاٗص. اىيٖ ٌّ إّا ّحَذك ّٗسرٞؼْل ّٗسرٖذٝل ّٗسرغفشك ّٗر٘ب إىٞل، ّٗثػ ْٜيٞل اىخٞش م ّئ، ّشنشك ٗﻻ ّنفشك، ّٗخيغ ّٗرشك ٍِ ٖٝجشك، اىيٖ ٌّ إّٝاك ؼّثذ ٗىل ّص ّيٜ ّٗسجذ، ٗإىٞل ّسٚؼ ّٗحَذ، ّشج٘ا سحَرل ّٗخشػ ٚزاتل، إ ُّ ػزاتل اىجذّ تاىنفاس ٍيحق، اىيٖ ٌّ ىل اىحَذ م ّئ، ٗىل اىشنش م ّئ، ٗإىٞل ٝشجغ اﻷٍش م ّئ ػﻻّّٞرٔ ٗس ّشٓ، فإٔو أّد أُ ذحَذ، ٗإٔو أّد أُ ذؼثذ، ٗأّد ػيٚ م ّو شٜ ٍء قذٝش ،اىيٖ ٌّ ىل اىحَذ حرّٚ ذشظٚ، ٗىل اىحَذ إرا سظٞد، ٗىل اىحَذ تؼذ اى ّشظٚ ىل اىحَذ ماىيزِٝ قاى٘ا خٞشاً ٍ َّا ّق٘ه، ٗىل اىحَذ ما ّىزٛ ذق٘ه، ٗىل اىحَذ ػيٚ م ّو حاه، اىيٖ ٌّ ىل اىحَذ، أّد ّ٘س اىسَاٗاخ ٗاﻷسض، ٗأّد تن ّو شٜ ٍء ػيٌٞ.
    [Show full text]
  • Practical Paranoia Macos 10.13 V1.3 20180310
    1 Practical Paranoia: macOS 10.13 Security Essentials Author: Marc Mintz Copyright © 2016, 2017, 2018 by The Practical Paranoid, LLC. Notice of Rights: All rights reserved. No part of this document may be reproduced or transmitted in any form by any means without the prior written permission of the author. For information on obtaining permission for reprints and excerpts, contact the author at [email protected], +1 888.504.5591. Notice of Liability: The information in this document is presented on an As Is basis, without warranty. While every precaution has been taken in the preparation of this document, the author shall have no liability to any person or entity with respect to any loss or damage caused by or alleged to be caused directly or indirectly by the instructions contained in this document, or by the software and hardware products described within it. It is provided with the understanding that no professional relationship exists and no professional security or Information Technology services have been offered between the author or the publisher and the reader. If security or Information Technology expert assistance is required, the services of a professional person should be sought. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the author was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified in this document are used in editorial fashion only and for the benefit of such companies with no intention of infringement of trademark.
    [Show full text]