Connected MX

Connected MX

Policy-based endpoint protection with rule-based file sync and sharing.

Discover how Connected MX provides enterprise endpoint protection for secure information access, sharing and backup without compromising mobile workforce productivity.

Policy-based endpoint protection with rule-based file sync and sharing.

  • Take control of your mobile information with policy-based management
  • Securely preview, access, download and share your information on any device and with any consumer
  • Meet business assurance objectives with automatic, continuous and extensible endpoint protection
  • Reduce exposure to legal and financial risk with defensible auditing and eDiscovery/early case assessment
  • Analyze and visualize mobile information to support data-driven decision making
  • Improve and enhance mobile workforce productivity with end-user conveniences that do not compromise business assurance requirements

Endpoint Information Management for the Mobile Workforce

Watch this video to see how Connected MX helps you to protect, manage and control endpoint information without compromising ever growing, on-demand needs of your mobile workforce.

Policy-based management

  • Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.

  • Access and view all the files and folders on endpoint devices – both active and deleted – from a browser or a mobile app. Follow intuitive instructions to view version history, restore, download, or share the content in a few clicks.
  • Run real-time reports to get backup status, user account status, data trends, PII sharing overrides, policy audits, and more to make informed, data-driven decisions.
  • Empower end-users to backup and restore data on their own with self-managed workflows. Perform point-in-time restore on files or folders to restore information to a particular date and time during disasters such as a ransomware attack.

  • Take control over backup, retention, sync, and share with policy management. Enforce policies to protect confidential information such as PII and PHI, extend retention policies to maintain file versions for a longer period of time.


Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.


Veja como ele funciona para TI:



    Defina ou importe a hierarquia organizacional, crie ou importe contas de usuários e alinhe usuários finais com a hierarquia.



    Crie políticas para definir do que será feito backup, que tipo de informação pode ser compartilhado, com quem as informações podem ser compartilhadas e com quais dispositivos elas podem ser sincronizadas.



    Use os recursos avançados de criação de relatórios para monitorar a aderência às políticas, assegurar a conformidade do acesso a informações e identificar os responsáveis das informações.

Veja como ele funciona para o usuário final:


    Acesso e instalação

    Faça logon no HPE Connected MX usando o link no email de boas-vindas. Preencha seu perfil de usuário e faça download do agente de endpoint para começar a proteger seus dados e obter acesso a eles.



    As políticas garantem proteção contínua. Use a pasta do HPE Connected MX para sincronizar os dados com o seu smartphone ou tablet. Faça logon na interface da Web para criar e gerenciar o compartilhamento dos seus dados.



    Excluiu um arquivo, perdeu o disco rígido ou recebeu um computador novo? Não tem problema! Use o HPE Connected MX para restaurar imediatamente e com toda facilidade itens isolados ou diretórios completos.

Comece hoje mesmo!

Experimente o HPE Connected MX gratuitamente

Como o CMX funciona 1

Licença gratuita por 30 dias

Como o CMX funciona 4

Versão completa, com todos os recursos

Como o CMX funciona 3

Suporte profissional

Como o CMX funciona 2

Nenhum cartão de crédito é necessário

Como o CMX funciona 5

Nenhum contrato é necessário

Data sheet

Connected MX Advanced Endpoint Protection


(PDF 246 KB)

Data sheet

Connected MX and ESKM Secure Endpoint Devices


(PDF 724 KB)

White paper

Reduce Mobile Worker Data Risks


(PDF 136KB )

White paper

Practice vs Policy Survey Report


(PDF 237KB )

White paper

Mobile Information Management—Challenges and Best Practices


(PDF 432KB )


Managing Mobile Information


(PDF 2.3 MB)

White paper

Introduction to Mobile Information Management


(PDF 638KB )

Case study

Qlik Reduces Risk with Enterprise-grade Cloud Backup and Recovery


(PDF 324 KB)

Related Products, Solutions and Services

PC Backup

Connected Backup

Backup solution for application and user data stored locally on end-user computers.

Backup Software

Data Protector

Intelligent and automated backup and recovery to protect, analyze and optimize.

Backup Monitoring

Backup Navigator

Backup monitoring and reporting software that uses analytics to proactively identify and resolve issues.

Application Archiving

Structured Data Manager

Application archiving and retirement while retaining data access for compliance, eDiscovery and operations.

Information Management

Information Management

Delivering backup, recovery, analytics, and optimization solutions for enterprise data protection.

Big Data Services

Big Data Professional Services

Harness the power of all your data with professional services.

Engage with our Backup and Governance Community

Backup and Governance Blog

Get the latest on information management, backup, and governance.

HPE IMG Insights on Twitter

Get the latest tweets from IMG Insights on Twitter.

HPE Software on LinkedIn

Connect with experts and discuss how to make your HPE software work for you.

HPE Software on Facebook

Join with peers and experts to discuss how to make your HPE software work for you.

HPE Business Insights

Gain strategic insights from IT leaders who help others define, measure and achieve better IT performances.