Exhibition activities
2023 MIF: Cloud Network Security Integration helps Guangdong and Macao build digital infrastructure
Oct.24.2023

From October 19 to 22, the 28th Macau International Trade and Investment Exhibition (MIF) sponsored by Macao Trade and Investment Promotion Bureau was held in Macao Venetian Golden Exhibition. As a representative of Macao technology enterprises in the field of communication network, Guanglian was invited to attend the conference, and brought SD-WAN network communication solutions and customer cases. Participants exchanged views on the development of Guangdong-Macao communication network.



At the same time of the exhibition, the "2023 Macao Innovation and Technology Forum - Building Digital Infrastructure: Cloud Network Security Integration to help Macao's government and Enterprise Market Network Security" hosted by the Internet Society of Macau, co-organized by the Digital Economy Association of Macao Greater Bay Area and supported by the Macao Science and Technology Development Fund was held on October 20. Witness the signing of a cooperation agreement between Guanglian Century Technology Co., Ltd. and Hong Kong Applied Science and Technology Research Institute Co., LTD. Guanglian hopes to contribute to the development of applied science and technology in Macao and the Greater Bay Area with its research and development products and technological knowledge in network communication.



This forum is supported by the Macao Science and Technology Development Fund. Among the guests present were Ms GUI Lin IP, Member of the Macao Science and Technology Development Fund; Mr Tang Wai-keung, Director of Education Resources Department, Education and Youth Bureau; Mr Chan Zu-wing, Acting Director of Science and Technology Department, Economic and Technology Bureau; Mr Chan Chi-ming, Manager of Local Exhibition Promotion Department, International Trade Promotion Bureau; Mr Yang Yuen-cheung, Director of Information Construction and Facilities, Municipal Services Department; Mr Choi Chang-hung, Director of Information Department, Tourism Bureau; Mr Cheng Yun-choi, Senior Technician, Post and Telecommunications Bureau; Mr Fung Ka-chiu, Director of Gaming Research Institute, Macau Lin Cantang, acting Dean of School of Applied Science, University of Science and Technology.



At the same time, the forum invited four representative experts in the field of cloud network security to give speeches. They are Jiang Zhaohui, founder and CEO & CTO of Guangdong Yuefang Technology Co., LTD., Yang Tianshi, chief security expert of Beijing Qiming Star Information Security Technology Co., LTD., Wang Wenyong, Distinguished Professor of School of Computer Science and Engineering, Macao University of Science and Technology, and Tao Yaodong, Director of Industrial Internet Security Research Center, Beijing Jiaotong University. The theme of the speech is discussed and interpreted from various aspects such as chip, network, data and application layer.



Jiang Zhaohui, founder and CEO & CTO of Guangdong Yuefang Technology Co., LTD., shared his views from the perspective of chips. The application status of industrial chips in China is that the industrial scene is extremely fragmented, the chip specification needs are complex, and the power consumption, area and cost are highly sensitive. Under the traditional chip development method, customized development for industrial segmentation scenarios, and huge investment in the development time and cost of streaming chips, so China's industrial chip market has been ruled by foreign manufacturers for many years, and domestic manufacturers mostly start from the consumer level, there is still a large catch-up space. Therefore, how to quickly and efficiently develop domestic independent controllable industrial chips is the key to China's new digital infrastructure, at the same time, Jiang Zhaohui shared that by creating an industrial chip DSA platform based on RISC-V open source instruction set architecture, and then superposing the software stack ability, you can solve the above problem and achieve domestic independent controllable industrial chips. This technology can be applied to industrial and consumer iot scenarios, and can be expanded to intelligent industrial perception and other fields, effectively helping Guangdong and Macao technology enterprises to enhance their digital capabilities.



Yang Tianshi, chief security expert of Beijing Qiming Star Information Security Technology Co., LTD., mentioned that the computing network is a new type of information infrastructure with computing as the center and the network as the foundation, and the network, cloud, data, intelligence, security, edge, end, and chain (ABCDNETS) are deeply integrated, and the goal of "ubiquitous computing power, co-existence of computing network, intelligent arrangement, and integrated service" is realized. Gradually promote computing power to become the same as water and electricity, can be "one-point access, access and use" of social services, to achieve the vision of "computing power everywhere, network everywhere, intelligence everywhere". By building an integrated and collaborative security guarantee system, data risk identification is carried out using technical detection means, security protection of cloud applications, and safe and reliable computing power to cope with advanced threat attacks. Yang Tianshi stated that by setting up the infrastructure layer (1 cloud security base), the capability arrangement layer (1 security center, 1 data center), and the operation service layer (1 security operation center) to build the security architecture of the computing power center, it can effectively help ensure the security of the communication network.



At the same time, Wang Wenyong, distinguished professor of the School of Computer Science and Engineering, Macao University of Science and Technology, also shared that cross-border data circulation is the cornerstone of the exchange of global social and economic activities, and the G20 digital economy track in 2022 listed "free flow of trusted data and cross-border data flow" as one of the three core topics, and cross-border trusted data space is the extension and adaptation in cross-border scenarios. It is a distributed infrastructure built on the existing information network with security gateway as the boundary and its network space. Based on the concept of traceability, accountability and multi-party compliance, it ensures the compliance and performance of data flow agreements through basic framework and systematic technical arrangements, and solves the security and trust problems among different entities such as providers, users and service providers of data elements in different territories. Support the establishment of a trusted data ecosystem to achieve reliable, controllable, compliant and co-governed data sharing, exchange and application. Data elements are the foundation of digitalization, networking and intelligence, and trusted data space mainly promotes the release of value of data elements through the construction of a digital economy with data as the key element. Wang Wenyong also shared the current cooperation between Macao University of Science and Technology and Guanglian Century to jointly create a demonstration application of cross-border trusted data space based on SD-WAN, which helps to promote the construction of Guangdong-Hong Kong-Macao Greater Bay Area and Hengqin Guangdong-Macao Deep Cooperation Zone.



At the same time, Tao Yaodong, director of the Industrial Internet Security Research Center of Beijing Jiaotong University, also said that the trusted data circulation is the key to promote the interconnection of industrial data value, and the trusted data space is a distributed key data infrastructure for sharing, circulation and application on the existing information network, and ensures the confirmation, implementation and maintenance of the data circulation agreement through systematic technical arrangements. Solve security and trust issues among data element providers, users, and service providers to achieve data-driven digital transformation. Trusted data space system architecture needs to be constructed from the business perspective, functional perspective, process perspective and technical perspective. First, the business perspective describes the three main participants of trusted data space: data providers, data users and intermediate service providers; Functional perspective describes three core components and nine main functions of trusted data space business activities; From the perspective of process, the author describes the activity process of each participant in the trusted data space from the eight life cycles of data circulation. The technical perspective describes the eight main functions of trusted data space and the key technologies needed; Enable data exchanges and industrial Internet platforms by deploying flexible solutions, building spatial architectures for multi-party business needs to serve local applications in the industry.



At the same forum, there was also a roundtable discussion, chaired by Mr. Cheng Cheng Fa, Acting Dean of Cheng Yu-tung College of the University of Macau, and four guests had an in-depth discussion on the theme of "How to build a secure network to help Macao's government and enterprise informatization digital infrastructure".



Zhang Xinyu, chief architect of Guanglian Century Technology Co., Ltd. was invited to participate in the forum, and gave a speech to the participants on cloud network security integration and network security integration technology. Zhang Xinyu said that Guanglian Group began to provide customers with WAN services in 2003, and as a professional WAN service provider, this time to bring integrated SASE services to Macau. Through Huawei's cloud security service, combined with the optical link global backbone network, and the terminal's SD-WAN CPE, the cloud pipe end integration of SASE service is realized, from the user end to the cloud, providing a comprehensive management and control platform through the integration of the whole network visual supervision. At the same time, the professional operation and maintenance service team of the Optical Link Group will actively monitor the network 7x24 hours to ensure the continuous stability and normal network services, and then automatically intercept attacks through the efficient intelligent AI of Huawei Qiankun Cloud's database around the world, effectively improve network security, reduce the difficulty of the entire network operation and maintenance, and improve the efficiency of network operation and maintenance. To provide customers with a safe, stable and efficient network.



Huang Shuzhan, president of the Macao International Internet Association (chairman of Guanglian Century Technology Co., LTD.), said after the meeting that Macao's government and enterprise informatization is inseparable from the design of the underlying network and the support of the system, the security of data information, and the creation of cloud network security integration solutions are the future road to help the digital transformation of Macao's government and enterprise market. This time, we invited the Century of Light to introduce the latest cloud network security technology to the audience, and invited four very representative experts in the field of cloud network security to give speeches on the theme, which is believed to be helpful to promote the digital transformation of the Macao government and enterprises. Adhering to the purpose of hosting the conference, the Association will work closely with the relevant departments of the Macau government, unite the forces and expertise of all parties, and jointly promote the digital transformation of the Macao government and enterprises, and promote industrial development.


  • Trust
    Huawei's preferred MSP
  • Major
    Many to one system
  • Hassel free
    Exclusive Engineer Services
  • Standardization
    One-stop implementation services
  • Intellectualization
    Intelligent robot operation and maintenance
  • Visualization
    7-by-24 hour monitoring center