Big Data
Showing results for 
Search instead for 
Do you mean 

Data Protection: Protecting business critical mobile endpoint data with HP Connected Backup v8.8

EdGavin ‎02-06-2014 07:37 AM - edited ‎02-19-2015 12:52 PM

HP Connected Backup provides anywhere, secure access to protected data; empowering your mobile workforce, boosting productivity, and reducing the cost and risk associated with compliance and eDiscovery requirements.


This post walks us through the process of leveraging the HP Connected Backup version 8.8 agent to specify the information on users’ mobile devices that should be backed up to the secure and compliant HP Connected Backup cloud data centers.


Initialization of the HP Connected Backup version 8.8 agent UI brings the user to the backup page.  This page enables the user to navigate a file system metadata structure representative of the device file system.  Navigation may be by library or by the more technical root level, in this case C.


The main panel shows selected libraries, folders, or files along with their status for backup selection.  In this scenario, Desktop and Documents have their SELECT statuses checked.  The legend indicates that the libraries are included for backup.




Upon initialization, users may notice that much of their information has already been selected for backup. This may be the result of your backup administrator defining rules to ensure that important information is backed up, subject to corporate requirements.  Rule definitions can be viewed by clicking on the wrench icon on the UI.


Locked rules are defined by administrators and deployed to backup agents for enforcement.  The rules are indeed locked against end user modification to ensure that the information that the company requirements for information backed up are met.




End users may extend backup rules to meet their individual requirements, so long as they do not present a conflict with the locked rules.  In this case, the user leverages the rule wizard to include the Lynx folder within the selected information to be backed up.  As part of this rule, the user also specifies to include all files within all subfolders.


Once both administrator and end user selections for backup have been made, backup can take place as an automated function, or it can be kicked-off interactively.  Administrators may own exclusive control over when end user backups run, or they may allow the end users to specify their own preferences.  Given the authorization, the user can choose to not have backup run on weekend days.




Once the backup is complete, the user has the option of reviewing the statistics associated with the backup.  Specific files that were backed up, as well as the source side data reduction statistics, can be displayed.  HP Connected Backup's patented SendOnce and EmailOptimizer deduplication technologies regularly serve to reduce information volume by up to 70 percent prior to network transmission enabled, effective data protection in the most bandwidth constrained environments.


In summary, HP Connected Backup v8.8 delivers a simplified and intuitive user experience; enabling administrators and end users to ensure that their most important information assets are backed up and available to meet the accessibility requirements of the mobile user.



About the Author


Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all