Product Advantages

Complexity Made Simple

Projects are simplified with remote deployment, heterogeneous cloud deployment, and the option to connect to Huawei Cloud if centralized O&M is needed.

Best of Both: Edge-Cloud

Bridge the edge and the cloud, integrate data and isolate services across networks and organizations, and connect internal services on demand.

Cross-Network, Cross-Domain Data Exchange

Securely exchange data and coordinate applications across layers, departments, and provinces.

Ubiquitous Digital Connections

Fortify multi-cloud management of enterprise data and consoles, with two modes available to suit your precise needs.

Where to Use

Where to Use

Terms & Conditions


活动时间: 2020年8月12日-2020年9月11日



Deployment Modes

Hybrid (IEF-based, Public Cloud)

Edge-Cloud Collaboration on a Unified Cloud Console

IEF deployment (software-only, for supported hardware) and IES deployment (integrated software and hardware)


· Straightforward installation, deployment, upgrade, and capacity expansion based on IEF.

· Collaborative management on and off the cloud allows both IDC deployment and utilization of cloud services.

· Quick version upgrade and vulnerability patch installation make software maintenance easier.

· You only need to manage your data and focus on data plane services. Leave the rest to the cloud for minimal O&M.


Abnormal or disrupted connections may affect service stability and continuity.

On-premises (Huawei Cloud Stack)

Meets the multi-cloud management requirements of control, data, and easily-accessible console.


· Site-deploy allows easy installation, deployment, upgrade, and scale-out, improving overall efficiency.

· Quick version upgrades and vulnerability patch installations simplify software maintenance.

· Privatized management ensures service continuity even when ROMA Site is disconnected from the cloud.


· Abnormal or disrupted connections may affect upgrade and scale-out.

· This mode requires the customer to play a greater role in maintenance.

· Customers need to build their own databases, as well as systems for monitoring, alarms, and authentication. SSO protocols must be supported for authentication.