Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Prey’s Scheduled Automations Streamline Mobile Device Management with Action-Triggered Responses

Lock and Alarm Laptops, Phones and Tablets During Non-Use Hours

Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Scheduled Automations, a new capability available to Enterprise and Education customers. Prey’s Scheduled Automations provide a simple way to schedule and enforce mobile device management (MDM) policies that respond to triggers such as low battery level, hardware changes, or geofencing movement detection.

Managers can use the new automation function to set rules for an organization’s mobile devices that deter or prevent off-hours use or to lock devices on specific days, hours, and date ranges. Prey Automations can be set to take action by displaying a message on the device or devices, sounding an alarm, or locking devices and their data.

Read More: BitPay Launches Support for Ethereum

Related Posts
1 of 40,601

“Prey’s Scheduled Automations were designed to save users time by streamlining manually-executed actions. Furthermore, it is an important improvement when it comes to reaction time when a device’s location conditions are deemed unsafe–the system can react automatically to secure the devices’ data and start gathering recovery evidence,” said Carlos Yaconi, founder and CEO of Prey Inc. “With Scheduled Automations, hospitals can lock access to laptops or tablets outside of office hours. Schools can use Prey to enforce curfews for tablet, Chromebook or smartphone use. And enterprises can set automation rules for low battery devices.”

Read More: Long Blockchain Corp. Enters into Definitive Agreement for Sale of Its Beverage Subsidiary Long Island Brand Beverages

The initial release of Scheduled Automations includes six pre-configured events (with certain limitations for operating systems). Actions can be triggered by:

  • Exact Time — Set an action to occur at a specific date and execution time;
  • Repeat Time — Set an action to be executed on specific days and hours, recurrently or in a date range;
  • Low Battery — Activate a reaction when a device OS detects that battery ́power is low;
  • Hardware Changes — Trigger a response when Prey detects a change of hardware in a device (system, motherboard, CPU, RAM or network interfaces);
  • Stop Charging — Detect and react to a device that is unplugged from its power source;
  • Start Charging — Detect when a device is plugged into a power source, with automated reaction.

Read More: Relex Development Invited to Join Blockchain Technology Council of Belarus

1 Comment
  1. Copper scrap segregation Copper reclamation services Metal scrap collection
    Copper cable scrap analysis, Scrap metal reclaiming management, Scrap copper waste disposal

Leave A Reply

Your email address will not be published.