We, as humans, are completely dependent upon the internet. When we want to listen to a song, store data, or even when we want to buy some stuff for our household needs, we turn towards the internet to fulfill our needs.
The web world even possesses the ability to store identification data including fingerprints, iris scan and others. But thanks to attackers, nowadays, most of our data is up for sale, most definitely on the dark web. Shockingly our whole online identity can be bought for as low as $1,170. This includes accounts and data from 11 different groups; from online shopping to entertainment services, to personal finances accounts and data categorized as proof of identity.
Enter Prey as a multi-platform anti-theft management solution that helps businesses keep their mobile device fleets and data secure. This is done through a mixture of Anti-Theft and device management tools.
In a nutshell, Prey consists of two parts. The agent, installed on laptops, phones, and tablets, and the panel. Once its client’s fleet is covered with the agent, everything is managed online through the website’s panel, to which the user signs in.
There users can organize the fleet by labels, setup Control Zones (geofencing) to monitor movement on areas where devices should enter or shouldn’t exit and track their location globally to keep an eye on all assets.
If something goes wrong, the user will activate Prey’s tracking mode, or ‘MISSING mode’, which turns Prey into an evidence gathering machine. The platform generates reports with pictures, location, nearby WiFi networks, hardware changes, and more data critical to the retrieval of a device.
A Massively Experienced Leader
Carlos Yaconi, Prey’s CEO, kick-started the project’s global expansion and evolution together with the initial founder of the Linux application Tomás Pollak. This partnership took Prey to a worldwide release in 2010, which quickly escalated becoming the first global multi-platform anti-theft app.
Carlos studied Computer Science and Information Technology at Universidad Diego Portales and is an innovation graduate of Universidad del Desarrollo. His work as an entrepreneur goes further back, having founded two prior companies: Nectia, software developer company, and Bizware, a database service provider. In his spare time, you can usually find Carlos training as a ‘work in progress’ guitarist or listening to Pink Floyd.
Tackling the Competition
Currently, Prey is working on its user-focused development. Its offer and its features are constantly being developed for the user specific needs, making way for a sturdier product. The core of this concept is to adapt and grow Prey’s solutions to real needs, with prior knowledge that ensures the features are a result of an issue, not the other way around.
Prey’s clients have a direct line to the support team, which is prompt and ready to tackle any challenges and to guide the client’s experience across the platform. Great value on Prey’s support comes from a combination of active relationships with its customers, and quick assistance from the developers, which give user-fixes a high priority.
However, that’s not the end of it. To enrich this relationship, the company shares its advice on security with them, Prey also assists its clients when facing threats, and keeps an open line for any suggestions they could need security-wise.
A Pioneer Against Technology and Gadget Theft
In the very beginning, Prey pioneered this fight against technology and gadget theft, before services like ‘Find my iPhone’ even existed, and even today the organization is witnessing the great bond it created between itself and the public.
What’s more, theft is a problem that’s tough to beat, and nobody likes to feel helpless against it. That’s where Prey comes-in for aid. The difference is that it does so but not by taking the load and becoming the hero, quite the opposite actually; Prey looks to empower its users by giving them the tools they need to become the hero.
This great user-developer relationship pushes the company forward constantly with new problems to tackle, and new opportunities to provide the help users need.
Securing Devices for the Internet of Things
There’s a great topic, security services should keep an eye on for at least a couple of years: IoT, or the Internet of Things. Mobile environments are currently hyper-connected, but with IoT, this is growing exponentially to the point where connectable devices will come in all shapes and sizes, with extremely different utilities and little regulation.
How Prey secures these IoT devices, and the environments they generate, are concerns that currently challenge the security industry. The lack of security standards among these devices provides a challenge, especially when one needs to integrate them to a network without making it vulnerable. Furthermore, IoT will clash with IT’s current headache: Bring Your Own Device (BYOD) control and policies. When combined, both issues can escalate the need for a controlling filter.
With this in mind, Prey has many challenges to focus upon. Currently, the organization is investigating on the subject to understand the scope of the security issue, and how an integrative platform could aid mobile device security and management to cover the lack of protocols and standards.