
61
BU Score
Solid
Prey: Tracking & Security
✍️ BU Analytics Review
“
Prey: Tracking & Security is an Android app from Prey, Inc. in the Tools category, currently rated 3.2★ across 62,298 ratings. Initial signal reads as mixed reviews — supporters praise core features while critics cite stability/value gaps.
Our BU Score puts it at 61 — Solid (established niche player). For a Tools app, that means established niche player.
Track changes month-over-month in the Performance section below — live snapshot history and revenue forecast included.
creator
📊 Performance Tracking LIVE
Loading…
Rating
—
Reviews
—
Forecast Revenue / mo
—
Snapshots tracked
0
since first record
Range:
💰 Forecast Revenue / mo
MODELRevenue forecast computed from BU's 234 trigger model on each snapshot. Calibrated against ground-truth from 58 verified-revenue apps.
🔬Forecast Breakdown — Why This Estimate?Top 3 of 3 triggers
Our ML model uses 200+ signals from public data. These are the most influential for this app:
| Mid install base (62,298 ratings)METRIC | +$5,500 | |
| Below-average rating (3.2★)METRIC | −$1,500 | |
| Ad-supported / freemiumMETRIC | +$600 |
METRIC = structural app data · REVIEW = mined from user reviews · ✓ VERIFIED = Stripe-verified anchor (TrustMRR)
📈 Reviews Growth
LIVECumulative review count from first BU snapshot. Each point = a tracked update.
⭐ Rating Trend
LIVEAverage rating evolution. Updates with each new review batch.
🗓️ Snapshot Timeline
HISTORYEach bar shows a tracked update and the metric delta from the previous snapshot.
App Specs
🔐 Own this app? Claim & verify MRR →🔖 v2.6.18🔄 updated 1w ago📂 Tools💰 Free
📝 About this app
Enroll your Android smartphones and tablets or manage your entire inventory on the go. With this Android app, admins can monitor and secure their mobile fleet directly from any Android device.
UNIFIED FLEET MONITORING
Oversee your entire inventory regardless of the operating system. From this app, you can trigger actions and track locations for devices running Windows, macOS, Ubuntu, ChromeOS, and other Android devices, all from a single mobile dashboard.
Note on OS compatibility: Features such as Kill Switch, Remote Lock, or Missing Reports vary based on the target device's operating system and permissions to ensure the highest security standards.
CORE CAPABILITIES
● Always-on Tracking: Precise location data and Geofences with automated alerts for unauthorized movements.
● Remote Security: Wipe data, Screen Lock, Factory Reset, and Retrieve files to protect sensitive information.
● Evidence Reports: Gather network data, photos (opt-in), and location history from missing assets.
● Inventory management: Schedule security actions, manage device loans, and set custom team roles and permissions.
✽ Note: Features vary by plan. Please select the plan that best suits your organization's needs.
SECURITY FIRST: AUTHENTICATION
To provide the highest level of protection, Prey uses password-only authentication. Requiring full credentials instead of Face-ID or Fingerprints ensures that only authorized admins can execute sensitive security commands, eliminating risks associated with biometric bypasses.
WHY CHOOSE PREY?
● 15+ years of experience: A global leader in device recovery and mobile device management.
● Privacy & transparency: Open Source code ensures your data is only accessed when you explicitly request it via the platform.
● Certified protection: We are SOC2 certified, meeting the highest global standards for data security.
☆ Visit preyproject.com for more information
ACCESSIBILITY SERVICE USAGE
Prey uses Android's AccessibilityService API exclusively to enforce the Remote Screen Lock feature. When the legitimate device owner marks the device as missing or stolen from the Prey control panel and triggers a lock with password, the Accessibility Service blocks other apps from being opened until the correct unlock password is entered.
Prey does NOT use the AccessibilityService API to:
• Record audio, calls, or keystrokes
• Capture content from other apps
• Change user settings without consent
• Prevent uninstallation by the device user
• Bypass Android's privacy controls
Granting the Accessibility permission is optional and is only requested when Remote Screen Lock protection is enabled. You can revoke this permission at any time from Settings → Accessibility → Prey.
⌦ How to Uninstall Prey: For anti-theft protection, Prey requires the Device Admin permission, which prevents unauthorized users from removing the app. This is a separate permission from the Accessibility Service described above. To uninstall Prey, sign in on the login screen, disable the Device Admin permission, and then remove the app like any other.
UNIFIED FLEET MONITORING
Oversee your entire inventory regardless of the operating system. From this app, you can trigger actions and track locations for devices running Windows, macOS, Ubuntu, ChromeOS, and other Android devices, all from a single mobile dashboard.
Note on OS compatibility: Features such as Kill Switch, Remote Lock, or Missing Reports vary based on the target device's operating system and permissions to ensure the highest security standards.
CORE CAPABILITIES
● Always-on Tracking: Precise location data and Geofences with automated alerts for unauthorized movements.
● Remote Security: Wipe data, Screen Lock, Factory Reset, and Retrieve files to protect sensitive information.
● Evidence Reports: Gather network data, photos (opt-in), and location history from missing assets.
● Inventory management: Schedule security actions, manage device loans, and set custom team roles and permissions.
✽ Note: Features vary by plan. Please select the plan that best suits your organization's needs.
SECURITY FIRST: AUTHENTICATION
To provide the highest level of protection, Prey uses password-only authentication. Requiring full credentials instead of Face-ID or Fingerprints ensures that only authorized admins can execute sensitive security commands, eliminating risks associated with biometric bypasses.
WHY CHOOSE PREY?
● 15+ years of experience: A global leader in device recovery and mobile device management.
● Privacy & transparency: Open Source code ensures your data is only accessed when you explicitly request it via the platform.
● Certified protection: We are SOC2 certified, meeting the highest global standards for data security.
☆ Visit preyproject.com for more information
ACCESSIBILITY SERVICE USAGE
Prey uses Android's AccessibilityService API exclusively to enforce the Remote Screen Lock feature. When the legitimate device owner marks the device as missing or stolen from the Prey control panel and triggers a lock with password, the Accessibility Service blocks other apps from being opened until the correct unlock password is entered.
Prey does NOT use the AccessibilityService API to:
• Record audio, calls, or keystrokes
• Capture content from other apps
• Change user settings without consent
• Prevent uninstallation by the device user
• Bypass Android's privacy controls
Granting the Accessibility permission is optional and is only requested when Remote Screen Lock protection is enabled. You can revoke this permission at any time from Settings → Accessibility → Prey.
⌦ How to Uninstall Prey: For anti-theft protection, Prey requires the Device Admin permission, which prevents unauthorized users from removing the app. This is a separate permission from the Accessibility Service described above. To uninstall Prey, sign in on the login screen, disable the Device Admin permission, and then remove the app like any other.
Profile & Insights
Everything we know — and don't — about this app and its company.
Identification
- App name
- Prey: Tracking & Security
- Developer
- Prey, Inc.
- Bundle ID
- com.prey
- App Store URL
- Open in App Store
- Category
- Tools
- Content rating
- Not found
- Languages
- Not found
Company
- Website
- Not found
- Tagline
- Not found
- Description
- Not found
- Founded
- Not found
- HQ / Address
- Not found
- Employees
- Not found
- Logo
- Not found
Revenue
- Verified revenue / mo
- Not found
- AI revenue estimate / mo
- Not found
- AI annual estimate
- Not found
- ML model estimate / mo
- $1.8K/mo
- Top-grossing rank
- Not found
- All-time revenue
- Not found
- Pricing
- Not found
Founder
- Name
- Not found
- X / Twitter
- Not found
- Not found
- GitHub
- Not found
- X followers
- Not found
- Public statements
- Not found
Funding
- Total raised
- Not found
- Last round
- Not found
- Investors
- Not found
- Crunchbase
- Not found
- AngelList
- Not found
Press & Links
- Articles found
- Not found
- Listed on
- Not found
- Blog
- Not found
- Press / News
- Not found
Contacts & Socials
- Socials
- Not found
- Not found
- Phone
- Not found
- Contact page
- Not found
- About page
- Not found
Profile is built from iTunes Lookup + developer site scrape + ML revenue model. Empty fields show "Not found" — additional sources (Crunchbase, X, IndieHackers, Acquire.com) coming.
More Tools
Phone by Google
★ 4.5 · 47,248,471 reviews
Google Play services
★ 4.3 · 44,619,167 reviews
★ 4.1 · 29,135,018 reviews
Gboard - the Google Keyboard
★ 4.5 · 18,500,531 reviews
SHAREit: Transfer, Share Files
★ 4.3 · 18,247,718 reviews
gov.br
★ 4.5 · 12,551,225 reviews
MyTelkomsel – Buy Internet
★ 3.7 · 11,917,556 reviews
myIM3: Data Plan & Buy Package
★ 4.4 · 10,992,500 reviews
Browse BU Analytics
📚 All 55,000+ Books
🜍 Alchemy & Hermeticism
🔮 Magic & Ritual
🌙 Witchcraft & Paganism
⭐ Astrology & Cosmology
🃏 Divination & Tarot
📜 Tools
✡️ Kabbalah & Jewish Mysticism
🕉️ Mysticism & Contemplation
🕊️ Theosophy & Anthroposophy
🏛️ Freemasonry & Secret Societies
👻 Spiritualism & Afterlife
📖 Sacred Texts & Gnosticism
👁️ Supernatural & Occult Fiction
🧘 Spiritual Development
📚 Esoteric History & Biography
Info
About BU Analytics 


