Connected MX

Connected MX

Policy-based endpoint protection with rule-based file sync and sharing.

Discover how Connected MX provides enterprise endpoint protection for secure information access, sharing and backup without compromising mobile workforce productivity.

Policy-based endpoint protection with rule-based file sync and sharing.

  • Take control of your mobile information with policy-based management
  • Securely preview, access, download and share your information on any device and with any consumer
  • Meet business assurance objectives with automatic, continuous and extensible endpoint protection
  • Reduce exposure to legal and financial risk with defensible auditing and eDiscovery/early case assessment
  • Analyze and visualize mobile information to support data-driven decision making
  • Improve and enhance mobile workforce productivity with end-user conveniences that do not compromise business assurance requirements

Endpoint Information Management for the Mobile Workforce

Watch this video to see how Connected MX helps you to protect, manage and control endpoint information without compromising ever growing, on-demand needs of your mobile workforce.

Policy-based management

  • Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.

  • Access and view all the files and folders on endpoint devices – both active and deleted – from a browser or a mobile app. Follow intuitive instructions to view version history, restore, download, or share the content in a few clicks.
  • Run real-time reports to get backup status, user account status, data trends, PII sharing overrides, policy audits, and more to make informed, data-driven decisions.
  • Empower end-users to backup and restore data on their own with self-managed workflows. Perform point-in-time restore on files or folders to restore information to a particular date and time during disasters such as a ransomware attack.

  • Take control over backup, retention, sync, and share with policy management. Enforce policies to protect confidential information such as PII and PHI, extend retention policies to maintain file versions for a longer period of time.


Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.


Fonctionnement du point de vue du service informatique



    Définition ou importation de la hiérarchie de l'organisation, création ou importation des comptes utilisateurs et alignement des utilisateurs finaux avec la hiérarchie.



    Construction des stratégies définissant les éléments sauvegardés en continu, les types d'informations pouvant être partagés, et avec qui, ainsi que les périphériques pouvant être synchronisés.



    Utilisation des capacités avancées de génération de rapports afin de surveiller le respect des stratégies, d'assurer la conformité de l'accès aux informations et d'identifier les dépositaires des informations.

Fonctionnement du point de vue de l'utilisateur final


    Accès et installation

    Connexion à HPE Connected MX à l'aide du lien fourni dans l'e-mail de bienvenue, renseignement du profil utilisateur et téléchargement de l'agent de terminal pour commencer à protéger vos données et y accéder.



    Les stratégies assurent une protection continue. Utilisez le dossier HPE Connected MX pour synchroniser vos données avec votre smartphone ou votre tablette. Connectez-vous à l'interface Web pour définir et gérer le partage de vos données.



    Suppression accidentelle d'un fichier, perte d'un disque dur, changement d'ordinateur ? Aucun problème ! Utilisez HPE Connected MX pour restaurer facilement et rapidement des éléments individuels ou des répertoires complets.

Lancez-vous dès aujourd'hui

Essayez gratuitement HPE Connected MX

Comment fonctionne CMX 1

Licence gratuite de 30 jours

Comment fonctionne CMX 4

Version complète

Comment fonctionne CMX 3

Assistance professionnelle

Comment fonctionne CMX 2

Aucune carte bancaire requise

Comment fonctionne CMX 5

Sans contrat

Data sheet

Connected MX Advanced Endpoint Protection


(PDF 246 KB)

Data sheet

Connected MX and ESKM Secure Endpoint Devices


(PDF 724 KB)

White paper

Reduce Mobile Worker Data Risks


(PDF 136KB )

White paper

Practice vs Policy Survey Report


(PDF 237KB )

White paper

Mobile Information Management—Challenges and Best Practices


(PDF 432KB )


Managing Mobile Information


(PDF 2.3 MB)

White paper

Introduction to Mobile Information Management


(PDF 638KB )

Case study

Qlik Reduces Risk with Enterprise-grade Cloud Backup and Recovery


(PDF 324 KB)

Related Products, Solutions and Services

PC Backup

Connected Backup

Backup solution for application and user data stored locally on end-user computers.

Backup Software

Data Protector

Intelligent and automated backup and recovery to protect, analyze and optimize.

Backup Monitoring

Backup Navigator

Backup monitoring and reporting software that uses analytics to proactively identify and resolve issues.

Application Archiving

Structured Data Manager

Application archiving and retirement while retaining data access for compliance, eDiscovery and operations.

Information Management

Information Management

Delivering backup, recovery, analytics, and optimization solutions for enterprise data protection.

Big Data Services

Big Data Professional Services

Harness the power of all your data with professional services.

Engage with our Backup and Governance Community

Backup and Governance Blog

Get the latest on information management, backup, and governance.

HPE IMG Insights on Twitter

Get the latest tweets from IMG Insights on Twitter.

HPE Software on LinkedIn

Connect with experts and discuss how to make your HPE software work for you.

HPE Software on Facebook

Join with peers and experts to discuss how to make your HPE software work for you.

HPE Business Insights

Gain strategic insights from IT leaders who help others define, measure and achieve better IT performances.