Connected MX

Connected MX

Policy-based endpoint protection with rule-based file sync and sharing.

Discover how Connected MX provides enterprise endpoint protection for secure information access, sharing and backup without compromising mobile workforce productivity.

Policy-based endpoint protection with rule-based file sync and sharing.

  • Take control of your mobile information with policy-based management
  • Securely preview, access, download and share your information on any device and with any consumer
  • Meet business assurance objectives with automatic, continuous and extensible endpoint protection
  • Reduce exposure to legal and financial risk with defensible auditing and eDiscovery/early case assessment
  • Analyze and visualize mobile information to support data-driven decision making
  • Improve and enhance mobile workforce productivity with end-user conveniences that do not compromise business assurance requirements

Endpoint Information Management for the Mobile Workforce

Watch this video to see how Connected MX helps you to protect, manage and control endpoint information without compromising ever growing, on-demand needs of your mobile workforce.

Policy-based management

  • Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.

  • Access and view all the files and folders on endpoint devices – both active and deleted – from a browser or a mobile app. Follow intuitive instructions to view version history, restore, download, or share the content in a few clicks.
  • Run real-time reports to get backup status, user account status, data trends, PII sharing overrides, policy audits, and more to make informed, data-driven decisions.
  • Empower end-users to backup and restore data on their own with self-managed workflows. Perform point-in-time restore on files or folders to restore information to a particular date and time during disasters such as a ransomware attack.

  • Take control over backup, retention, sync, and share with policy management. Enforce policies to protect confidential information such as PII and PHI, extend retention policies to maintain file versions for a longer period of time.


Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.


Así es como funciona para TI:



    Defina o importe la jerarquía de la organización, cree o importe cuentas de usuario y alinee los usuarios finales con la jerarquía.



    Cree las políticas que definen los elementos para los que se crean copias de seguridad continuamente, el tipo de información que se puede compartir, con quién se puede compartir y con qué dispositivos se puede sincronizar.



    Use las capacidades de creación de informes avanzadas para supervisar el cumplimiento de las políticas, asegurar el cumplimiento del acceso a la información e identificar administradores de la información.

Así es como funciona para el usuario final:


    Acceso e instalación

    Inicie sesión en HP Connected MX mediante el vínculo que contiene el correo electrónico de bienvenida, complete su perfil de usuario y descargue el agente del extremo para comenzar a proteger sus datos y poder acceder a ellos.



    Las políticas garantizan la protección continuada. Use la carpeta de HP Connected MX para sincronizar los datos con su smartphone o tableta. Inice sesión en la interfaz web para crear y administrar el modo en que se comparten los datos.



    Si elimina un archivo por accidente, pierde un disco duro o recibe un nuevo equipo, ¡no se preocupe! Use HP Connected MX para restaurar elementos individuales o directorios completos de forma sencilla e inmediata.

Comience hoy mismo

Pruebe HP Connected MX gratis

Funcionamiento de CMX 1

Licencia de 30 días gratuita

Funcionamiento de CMX 4

Versión con todas las características

Funcionamiento de CMX 3

Servicio de soporte profesional

Funcionamiento de CMX 2

Sin necesidad de tarjeta de crédito

Funcionamiento de CMX 5

Sin necesidad de contrato

Data sheet

Connected MX Advanced Endpoint Protection


(PDF 246 KB)

Data sheet

Connected MX and ESKM Secure Endpoint Devices


(PDF 724 KB)

White paper

Reduce Mobile Worker Data Risks


(PDF 136KB )

White paper

Practice vs Policy Survey Report


(PDF 237KB )

White paper

Mobile Information Management—Challenges and Best Practices


(PDF 432KB )


Managing Mobile Information


(PDF 2.3 MB)

White paper

Introduction to Mobile Information Management


(PDF 638KB )

Case study

Qlik Reduces Risk with Enterprise-grade Cloud Backup and Recovery


(PDF 324 KB)

Related Products, Solutions and Services

PC Backup

Connected Backup

Backup solution for application and user data stored locally on end-user computers.

Backup Software

Data Protector

Intelligent and automated backup and recovery to protect, analyze and optimize.

Backup Monitoring

Backup Navigator

Backup monitoring and reporting software that uses analytics to proactively identify and resolve issues.

Application Archiving

Structured Data Manager

Application archiving and retirement while retaining data access for compliance, eDiscovery and operations.

Information Management

Information Management

Delivering backup, recovery, analytics, and optimization solutions for enterprise data protection.

Big Data Services

Big Data Professional Services

Harness the power of all your data with professional services.

Engage with our Backup and Governance Community

Backup and Governance Blog

Get the latest on information management, backup, and governance.

HPE IMG Insights on Twitter

Get the latest tweets from IMG Insights on Twitter.

HPE Software on LinkedIn

Connect with experts and discuss how to make your HPE software work for you.

HPE Software on Facebook

Join with peers and experts to discuss how to make your HPE software work for you.

HPE Business Insights

Gain strategic insights from IT leaders who help others define, measure and achieve better IT performances.