Connected MX

Connected MX

Policy-based endpoint protection with rule-based file sync and sharing.

Discover how Connected MX provides enterprise endpoint protection for secure information access, sharing and backup without compromising mobile workforce productivity.

Policy-based endpoint protection with rule-based file sync and sharing.

  • Take control of your mobile information with policy-based management
  • Securely preview, access, download and share your information on any device and with any consumer
  • Meet business assurance objectives with automatic, continuous and extensible endpoint protection
  • Reduce exposure to legal and financial risk with defensible auditing and eDiscovery/early case assessment
  • Analyze and visualize mobile information to support data-driven decision making
  • Improve and enhance mobile workforce productivity with end-user conveniences that do not compromise business assurance requirements

Endpoint Information Management for the Mobile Workforce

Watch this video to see how Connected MX helps you to protect, manage and control endpoint information without compromising ever growing, on-demand needs of your mobile workforce.

Policy-based management

  • Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.

  • Access and view all the files and folders on endpoint devices – both active and deleted – from a browser or a mobile app. Follow intuitive instructions to view version history, restore, download, or share the content in a few clicks.
  • Run real-time reports to get backup status, user account status, data trends, PII sharing overrides, policy audits, and more to make informed, data-driven decisions.
  • Empower end-users to backup and restore data on their own with self-managed workflows. Perform point-in-time restore on files or folders to restore information to a particular date and time during disasters such as a ransomware attack.

  • Take control over backup, retention, sync, and share with policy management. Enforce policies to protect confidential information such as PII and PHI, extend retention policies to maintain file versions for a longer period of time.


Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.


Ecco come funziona per l'IT:



    Definite o importate la gerarchia organizzativa, create o importate gli account utente e allineate gli utenti finali alla gerarchia.



    Generate i criteri che definiscono quali dati sottoporre continuamente a backup, quali informazioni possono essere condivise e con chi e su quali dispositivi possono essere sincronizzate.



    Utilizzate le funzionalità avanzate di creazione di report per monitorare il rispetto dei criteri, garantire la conformità dell'accesso alle informazioni e identificare i responsabili delle informazioni.

Ecco come funziona per l'utente finale:


    Accesso e installazione

    Accedete a HPE Connected MX utilizzando il collegamento nell'e-mail di benvenuto, completate il profilo utente e scaricate l'agente endpoint per iniziare a proteggere i dati e accedervi.



    I criteri garantiscono una protezione continua. Utilizzate la cartella di HPE Connected MX per sincronizzare i dati con il vostro smartphone o tablet. Accedete all'interfaccia Web per creare e gestire la condivisione dei dati.



    Avete eliminato un file per errore, perso un disco rigido o ricevuto un nuovo computer? Nessun problema. Utilizzate HPE Connected MX per ripristinare in modo semplice e rapido singoli elementi o directory complete.

Inizia subito

Prova HPE Connected MX gratuitamente

CMX - Come funziona 1

Licenza gratuita per 30 giorni

CMX - Come funziona 4

Versione con funzionalità complete

CMX - Come funziona 3

Supporto professionale

CMX - Come funziona 2

Nessuna carta di credito richiesta

CMX - Come funziona 5

Nessun contratto richiesto

Data sheet

Connected MX Advanced Endpoint Protection


(PDF 246 KB)

Data sheet

Connected MX and ESKM Secure Endpoint Devices


(PDF 724 KB)

White paper

Reduce Mobile Worker Data Risks


(PDF 136KB )

White paper

Practice vs Policy Survey Report


(PDF 237KB )

White paper

Mobile Information Management—Challenges and Best Practices


(PDF 432KB )


Managing Mobile Information


(PDF 2.3 MB)

White paper

Introduction to Mobile Information Management


(PDF 638KB )

Case study

Qlik Reduces Risk with Enterprise-grade Cloud Backup and Recovery


(PDF 324 KB)

Related Products, Solutions and Services

PC Backup

Connected Backup

Backup solution for application and user data stored locally on end-user computers.

Backup Software

Data Protector

Intelligent and automated backup and recovery to protect, analyze and optimize.

Backup Monitoring

Backup Navigator

Backup monitoring and reporting software that uses analytics to proactively identify and resolve issues.

Application Archiving

Structured Data Manager

Application archiving and retirement while retaining data access for compliance, eDiscovery and operations.

Information Management

Information Management

Delivering backup, recovery, analytics, and optimization solutions for enterprise data protection.

Big Data Services

Big Data Professional Services

Harness the power of all your data with professional services.

Engage with our Backup and Governance Community

Backup and Governance Blog

Get the latest on information management, backup, and governance.

HPE IMG Insights on Twitter

Get the latest tweets from IMG Insights on Twitter.

HPE Software on LinkedIn

Connect with experts and discuss how to make your HPE software work for you.

HPE Software on Facebook

Join with peers and experts to discuss how to make your HPE software work for you.

HPE Business Insights

Gain strategic insights from IT leaders who help others define, measure and achieve better IT performances.