Connected MX

Connected MX

Policy-based endpoint protection with rule-based file sync and sharing.

Discover how Connected MX provides enterprise endpoint protection for secure information access, sharing and backup without compromising mobile workforce productivity.

Policy-based endpoint protection with rule-based file sync and sharing.

  • Take control of your mobile information with policy-based management
  • Securely preview, access, download and share your information on any device and with any consumer
  • Meet business assurance objectives with automatic, continuous and extensible endpoint protection
  • Reduce exposure to legal and financial risk with defensible auditing and eDiscovery/early case assessment
  • Analyze and visualize mobile information to support data-driven decision making
  • Improve and enhance mobile workforce productivity with end-user conveniences that do not compromise business assurance requirements

Endpoint Information Management for the Mobile Workforce

Watch this video to see how Connected MX helps you to protect, manage and control endpoint information without compromising ever growing, on-demand needs of your mobile workforce.

Policy-based management

previous
  • Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.

  • Access and view all the files and folders on endpoint devices – both active and deleted – from a browser or a mobile app. Follow intuitive instructions to view version history, restore, download, or share the content in a few clicks.
  • Run real-time reports to get backup status, user account status, data trends, PII sharing overrides, policy audits, and more to make informed, data-driven decisions.
  • Empower end-users to backup and restore data on their own with self-managed workflows. Perform point-in-time restore on files or folders to restore information to a particular date and time during disasters such as a ransomware attack.

  • Take control over backup, retention, sync, and share with policy management. Enforce policies to protect confidential information such as PII and PHI, extend retention policies to maintain file versions for a longer period of time.

next

Enable each user to protect, view, and manage information on all the endpoint devices they own and the sync folder with a single user account.

Demos

É assim que funciona para as TI:

  •  

    Definir

    Defina ou importe a hierarquia organizacional, crie ou importe contas de utilizador e alinhe os utilizadores finais com a hierarquia.

  •  

    Criar

    Crie as políticas que definem os itens com cópia de segurança contínua, o tipo de informação que pode ser partilhada, com quem é possível partilhar e os dispositivos associados para sincronização.

  •  

    Monitorizar

    Utilize as capacidades de relatórios avançadas para monitorizar a adesão às políticas, garantir a conformidade do acesso às informações e identificar os conservadores das informações de identidade.

É assim que funciona para o Utilizador Final:

  •  

    Aceder e Instalar

    Inicie sessão no HPE Connected MX através da ligação apresentada no e-mail de boas-vindas, conclua o perfil de utilizador e transfira o agente de ponto final para começar a proteger os seus dados e obter acesso aos mesmos.

  •  

    Utilizar

    As políticas asseguram uma proteção contínua. Utilize a pasta HPE Connected MX para sincronizar os dados com o seu smartphone ou tablet. Inicie sessão na interface Web para criar e gerir a forma como os seus dados são partilhados.

  •  

     

     

    Restaurar

    Eliminou acidentalmente um ficheiro, perdeu um disco rígido ou adquiriu um computador novo – sem problemas. Utilize o HPE Connected MX para restaurar fácil e imediatamente itens individuais ou diretórios completos.

Começar Hoje Mesmo

Experimente gratuitamente o HPE Connected MX

Como funciona o CMX 1

Licença gratuita de 30 dias

Como funciona o CMX 4

Versão com funcionalidade completa

Como funciona o CMX 3

Suporte profissional

Como funciona o CMX 2

Sem necessidade de cartão de crédito

Como funciona o CMX 5

Sem necessidade de contrato
Resources

Data sheet

Connected MX Advanced Endpoint Protection

 

(PDF 246 KB)

Data sheet

Connected MX and ESKM Secure Endpoint Devices

 

(PDF 724 KB)

White paper

Reduce Mobile Worker Data Risks

 

(PDF 136KB )

White paper

Practice vs Policy Survey Report

 

(PDF 237KB )

White paper

Mobile Information Management—Challenges and Best Practices

 

(PDF 432KB )

Brochure

Managing Mobile Information

 

(PDF 2.3 MB)

White paper

Introduction to Mobile Information Management

 

(PDF 638KB )

Case study

Qlik Reduces Risk with Enterprise-grade Cloud Backup and Recovery

 

(PDF 324 KB)

Related Products, Solutions and Services

PC Backup

Connected Backup

Backup solution for application and user data stored locally on end-user computers.

Backup Software

Data Protector

Intelligent and automated backup and recovery to protect, analyze and optimize.

Backup Monitoring

Backup Navigator

Backup monitoring and reporting software that uses analytics to proactively identify and resolve issues.

Application Archiving

Structured Data Manager

Application archiving and retirement while retaining data access for compliance, eDiscovery and operations.

Information Management

Information Management

Delivering backup, recovery, analytics, and optimization solutions for enterprise data protection.

Big Data Services

Big Data Professional Services

Harness the power of all your data with professional services.

Engage with our Backup and Governance Community

Backup and Governance Blog

Get the latest on information management, backup, and governance.

HPE IMG Insights on Twitter

Get the latest tweets from IMG Insights on Twitter.

HPE Software on LinkedIn

Connect with experts and discuss how to make your HPE software work for you.

HPE Software on Facebook

Join with peers and experts to discuss how to make your HPE software work for you.

HPE Business Insights

Gain strategic insights from IT leaders who help others define, measure and achieve better IT performances.