Prey customers feed a steady stream of success emails to the company, and many of them end up as Recovery Stories on its website. “Installing Prey on non-present device takes some technical expertise, but as our customers attest, Prey has been instrumental getting their laptops back.” “Although Prey Anti-Theft always works best when it’s installed well in advance of a missing device, it also can be deployed after the fact,” said Carlos Yaconi, CEO, Prey Software. A recent PC Magazine article “ The Best Remote Access Software of 2018” rates six options: RemotePC, TeamViewer, LogMein, GoTOMyPC, VNCConnect and Splashtop Business Access.įree Software - In keeping with its Open Source roots, Prey also can be deployed via any number of free remote access software offerings. Remote Desktop App - For a device that is not linked to a Prey account, the user will have to deploy a remote desktop app to install and configure Prey remotely. An Unattended Install can also be achieved on a MAC or Linux-powered laptop. Both will work and install Prey on your systems. For Windows, there are two different installation methods, an EXE and an MSI installer. Unattended Install - The most technical users with remote access can execute the Prey Anti-Theft Unattended Install. Prey can then be installed on an off-premise device in one of three ways: At that point, the software can be installed, and Prey can locate the device. Next, the administrator will have to wait for the missing laptop to be turned on so that it can connect to a wireless network. This will enable the users to manually configure Prey Anti-Theft on a company or personal device. The first step for a remote installation is to set up a Prey account on a home or office computer. Read how the two organizations reclaimed their assets due to Prey Remote Installation: In addition, Prey has published a blog describing two different ways taken by Prey customers to installing Prey on laptops after they noticed that the devices were missing. 11, 2018 (GLOBE NEWSWIRE) - Prey Software, provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, today recommends three different approaches for remote installation on a missing laptop.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |