KDDI Secure Access

Get secure and easy remote access to your Cloud services and Web Systems anywhere, anytime

Enable remote access to your cloud services and web systems, including Google Apps, Office 365, etc. Perfect for BYOD and remote work.

Got problems? We've got solutions!

I want to get all my cloud services integrated and enhance security.

I want to avoid the risk of information leaking when losing my devices.

It is a hassle to manage all my ID and password for each of my cloud services.

Integration of remote access path using browser with built in VPN - for enhanced security

KDDI Secure Access uses a private browser gateway to connect to cloud and web systems. By restricting access to specific IP addresses, and integrating the remote access path, you can use the cloud service securely.

Not a single piece of data left on the devices, secure for both users and admin

The secure browser restricts users from downloading files, saving them, and sending files to any other application. Because no data is left on the devices, users can remotely and securely access cloud services, including groupware, web mail and web systems. Supported devices include Windows, MAC, iOS, and Android.

Single Sign-On function makes ID and password management easier

WIth our Single Sign-On (SSO), you can access all cloud services with one ID and password. This reduces the burden of having to manage each ID and password to your cloud and web system accounts.

What is KDDI Secure Access?

An easy-to-use remote access service which enables you to get connected to cloud services and office web systems securely. You can connect just by loging in to the system from any browser application on your PC, tablet or smarphone. No need to connect via a VPN.

Equipped with this high performance service, you do not need to spend any resources on system construction or operation as everything is cloud based. Services are provided for just a simple monthly charge.

Experience "KDDI Secure Access" with our 30-day free trial. Please contact us for more details.


Experience "KDDI Secure Access" with our 30-day free trial.
Please contact us using the inquiry form below.



It is possible to identify the total traffic volume, the number of sessions, the real-time traffic volume for each application, as well as usage based on past data. The software's default registration automatically identifies over 90 applications, furthermore users also can register their own additional applications.



The traffic flow of the entire network is optimized based on each application's target values as defined on the office optimization devices and the central server. Applications can be assigned to one of 15 user classes *1 that set the target values. User class priority levels beyond 15 are available as an optional service for an additional fee.



In addition to increased speed through a reduced number of ACKs *2 and expanded window size *3, efficient data transmission is realized through data compression and the cache function *4.

Dynamic WAN Selection (DWS)

In addition to "Visibility", "Control & QoS" and "WAN Acceleration", "Dynamic WAN Selection (DWS)" is provided as a new option service. DWS automatically checks the quality of redundant networks, and then selects the best network for each application. Basically, higher-priority traffic uses a primary network, and lower-priority traffic uses a secondary network. However, they are flexible enough to use a better network when hangs occur, or quality and throughput get lower.

Image:Dynamic WAN Selection (DWS)


This function provides an accurate statistical reporting for all applications based on measurements at the packet level.


Virtual sites

With this function, users can ascertain application use as well as utilize some of the optimization tools without installing any equipment.

  • *1 A user class is one or more applications that have been grouped together. Multiple applications can be set for one user class.
  • *2 In computer communications, acknowledgement (ACK) is a signal sent from the destination computer in situations such as when data has been properly forwarded to the destination computer from the source computer.
  • *3 Volume of data that can be transmitted continuously without delivery confirmation.
  • *4 A function that stores frequently used data in a high-speed storage device in order to eliminate the need to access the data from a slow-speed storage device every time it is needed.

Contact Us

If you have questions about prices and product details, please contact us at:


Weekdays 9:00-17:00(AEST)

Contact Us


Weekdays 9:00-17:00(AEST)

Inquiry Form