Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Rackspace Introduces Cloud Server Management App for the iPad

Easy Mobile Cloud Server Management with Free Rackspace Cloud Pro for iPad Application

Easy Mobile Cloud Server Management with Free Rackspace Cloud Pro for iPad Application

RackSpace Hosting (NYSE:RAX), today announced the release of Rackspace Cloud Pro™, a new application for Apple’s iPad™ to enable users to monitor and manage their Rackspace Cloud Servers™.

The features built into Cloud Pro for iPad allow RackSpace Cloud customers to:

  • Rename Cloud Servers
  • Resize Cloud Servers
  • Perform Hard Reboots
  • Perform Soft Reboots
  • List all the Cloud Servers on their account
  • View details about each Cloud Server
  • Manage backup schedules for Cloud Servers
  • Create new Cloud Servers (including from any existing backups)
  • View Rackspace Cloud system status as a whole
  • Ping public IP address and see how responsive a Cloud Server is from 41 different locations
  • Launch SSH Server (assuming user has an SSH app such as iSSH that supports launching via URL)

Rackspace Cloud Pro for iPad

Cloud Pro for iPad frees businesses and developers from their desktops by offering them enterprise-quality server control and functionality through the convenience and mobility of the iPad.

“As we build out our cloud, we expect to become more visible around the issues of openness, data access and customer choice,” stated Lew Moorman, President Cloud and Chief Strategy Officer, Rackspace Hosting. “Our goal is to allow our customers to be able to choose the services, applications, databases and OSs they want to use in a non-proprietary environment without the fear of being locked into one particular cloud. Our Cloud Server mobile management capability for the iPad is the latest example of Rackspace’s leadership in driving open cloud innovation.”

For more information and to download the app visit: http://www.rackspacecloud.com/ipad

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...