Over the past twenty-five years, Branch and Wide Area Networks (WANs) have been based on a \u201cbuild-your-own\u201d methodology, but it is starting to transition from purely build-your-own to a consume model.\u00a0\nA good analogy for this transition would be the music industry transformation.\u00a0 Twenty-five years ago, I used to buy a lot of vinyl records and would pick and choose the songs I liked, then build mix tapes.\u00a0 I was buying and owning everything; building my own, by selecting, configuring, managing and recording. I owned and controlled every aspect.\u00a0\nNext, I got to a stage where I could use iTunes, which introduced a management system from the cloud, so I no longer had to buy all the albums. I still bought the songs, but only the songs I wanted \u2014 reducing the need for storing records, buying all the equipment, and hours of configuring the tapes. I used iTunes to select, orchestrate and manage my music choices into playlists. In essence, it started to become software-defined.\nToday, I don\u2019t buy music anymore \u2014 I just consume it.\u00a0 I use Spotify and Pandora, and I build my own playlists in the Cloud. I benefit from playlists and channels that others built, but I still set my own \u201cpolicies\u201d of my choices of music without having to own and control it all.\u00a0 In fact, I play it on Sonos equipment, which uses cloud-based apps to tune the quality of the speakers for each room in my house without having to use the graphic equalizer and other accessories that I had to use in the past.\u00a0 Today, everything about my music utilization is virtualized. Think Music Function Virtualization (MFV).\nJust like the way I used to build my own mix tapes, organizations have been in the business of building their own branch office networks and WANs. They go out and purchase equipment, stack up hardware, configure and manage it all separately.\u00a0 The typical WAN is built around fixed places, with a hierarchy of headquarters, regional and branch offices.\u00a0\nHowever, with digital transformation, the business requirements that the network needs to address are changing. New networks need to embrace a more mobile and agile mindset. \u00a0The branch WAN transformation is occurring, and it is just beginning to move beyond the traditional build-your-own, fixed location hierarchy phase.\u00a0\nTECHNOLOGIES AND WORKSTYLE CHANGES\nJust like the way technologies and mobility trends such as web browsers, compression technologies and mobile players enabled me to start building playlists instead of mix tapes, there are technologies and workstyle changes that are now making this transition to software-defined networks possible.\u00a0\nThe first is the use of cloud-based applications.\u00a0 Rather than building their own private data center-based applications, most companies are heavily utilizing cloud-based applications. Examples include Salesforce, Office 365, Expensify, etc. This trend also allows companies that traditionally have not been able to prioritize the expense of building applications to very quickly compete in previously unattainable markets. This requires all organizations to become much more agile. Consequently, it\u2019s estimated that 80 percent or more of enterprise traffic is going out to the internet. Therefore, it no longer makes sense to build a network that is designed to take traffic back to a data center, to then go out to internet-based apps, back to a data center and then back to the user. Also, because the use of internet applications is so paramount to running a business today, the need for network resilience has dramatically increased. Simply put, the network cannot go down.\nThe next aspect that\u2019s changing rapidly is the need for flexible, lower cost bandwidth. Traditional networks were mostly built with low bandwidth private lines using MPLS as a packet-forwarding technology to optimize performance. This approach was adequate for private in-house applications and low video usage. Today, however, bandwidth requirements are exploding due to video, Cloud-bound traffic, and a growing number of new applications.\u00a0 While it is difficult and expensive to scale MPLS to meet this demand, combinations of broadband and LTE provide more bandwidth, resilience and speed-to-deploy\u2014all at a much lower cost.\nThe third aspect driving this transition is the millennial generation entering the workforce. This generation would never think about buying albums and making their own mix tapes. Millennials entering the IT field are motivated to use the most effective ways to quickly get to business results. They don\u2019t have the traditional view of building and owning everything. They think about what\u2019s in the Cloud, what they can use, what they can get spun up and going right away. They think about how they can leverage this model to securely create operational efficiencies, cut costs and create ease-of-management, while still having control over network policies.\u00a0\nThe fourth driver is workforce mobility.\u00a0 Truly, work is no longer a place to go, but a thing to do \u2013 from anywhere.\u00a0 This mobility aspect drives the need for more devices to be connected to the network\u2014and the traditional IT organization doesn\u2019t get to dictate what is being used\u2014 it\u2019s a BYOD (bring your own device) environment.\u00a0 Typically, workers will have a smartphone, tablet, and laptop.\u00a0 IDC predicts that by 2020, 75 percent of people will be working in a mobile way.\u00a0 This is not to say they will all be traveling sales people; it just means the way we work will be in a mobile format, for example, mobile healthcare, connected construction and public safety officers.\nTHE INTERNET OF THINGS\nThe Internet of Things (IoT) is the fifth driver. IoT in an enterprise environment will enable whole new levels of efficacy and will create about 10 times the number of device connections to the network with cameras and sensors. If not done properly, this can potentially create the world\u2019s largest attack surface for hackers.\u00a0 For this reason, the need for a whole new security paradigm is in play here. Organizations need a new way of deploying, configuring, and managing deployments, because the old way of pushing data center security to the edge is too manpower-intensive, complex, expensive and risky.\u00a0 Consequently, there is a strong need for not only a new mindset but also a new type of network solution. \u00a0 \u00a0\u00a0\u00a0\nUTILIZING LTE WITH 5G ON THE HORIZON\nFinally, driving this transformation is the growth of LTE as an enterprise WAN.\u00a0 As mentioned earlier, for many people work is no longer a place to go, but a thing to do.\u00a0 Robust WAN connectivity in vehicles, temporary environments, machine-to-machine, and traveling individuals are all needed in new network projects.\u00a0 The inclusion of wireless WAN by design into the next-generation network is imperative.\u00a0 This is a prevalent component that will continue to grow, and even more so as 5G becomes more real.\u00a0 Simply put, 5G can change everything.\u00a0 5G has the ability to make extremely fast performance capabilities and low latency in the WAN a reality \u2014 and because it\u2019s wireless, organizations will be able to deploy quickly \u2014 without the hassle of dealing with wired solution limitations.\u00a0 With adoptions coming into play, such as IoT and the mobility of workers, the utilization of LTE as it moves into 5G is an extremely important component of how the next-generation WANs must be built.\u00a0\nIMPORTANCE OF SOFTWARE-DEFINED TECHNOLOGIES \u00a0\u00a0\nSoftware-defined WAN (SD-WAN) and Network Function Virtualization (NFV) platforms are a very critical set of technologies needed to enable the transition. They are designed to decrease the manual tasks and operational overhead, as well as increase speed-of-deploy and flexibility\u2014all of which are needed to build the networks of the future.\u00a0 They are not just designed to address networks for places, and land lines, like the build-your-own networks over many years. Rather they are designed from the ground up for mobility, and for people, places and things.\u00a0 This is important because networking solutions that are not designed for mobility typically inflate WAN traffic by up to 30 percent for synthetic overhead, such as communication between network elements to decide how to best optimize the WAN.\u00a0 The leaders in building networks of the future are utilizing software-defined technologies and LTE, along with cloud, mobility and are keeping IoT in mind from the beginning.\u00a0\nCHOOSING SOLUTIONS FOR THE NEXT GENERATION OF NETWORKS\u00a0\nThe right solution is key to success as organizations transition to next-generation networks. Here are some must-have capabilities:\n\nUser-friendly graphical interfaces, where network builders can utilize capabilities, such as zero-touch deploy, policy management, data usage, health monitoring, orchestration and automation without the need to program or make command line changes in each device.\nExtensibility capabilities through APIs that allow ultimate flexibility to develop specific applications with just that little tweak required to solve the business problem they are trying to address.\u00a0\nAbility to define and maximize business-based policy like Smart-WAN selection, dynamic traffic steering, advanced routing, and advanced traffic control by choosing intuitive GUI menu options in cloud-based systems\u2014without having to have network engineer level understanding of how to configure.\nAbility to deploy solutions in a variety of environments including those for fixed branches, in-vehicle, IoT, M2M and mobile workers as this is the reality of next-generation network needs.\n\nSOFTWARE-DEFINED PERIMETER & NETWORK VIRTUALIZATION\nSoftware-Defined Perimeter (SD-P) solutions with network virtualization as an integrated part of the platform are needed for enterprise IoT. Network virtualization provides IT teams with the ability to spin up thousands of \u201cthings\u201d on the network in a very automated way, with a new level of security\u2014that wouldn\u2019t be possible in a traditional TCP IP Network.\u00a0 This is because an SD-P approach gives enterprises a private \u201cdark cloud\u201d that is invisible to the external world. Only the things or people selected by the administrator are allowed to go, and these things and people can see only what they have approved access.\u00a0 Within this dark cloud, there is no ability for hackers to move freely within network and do discoveries\u2014they can\u2019t hack what they can\u2019t see.\u00a0\nFINDING THE BEST NEXT-GENERATION NETWORKS\nMany vendors today are positioning themselves to be SD-WAN vendors; a recent report from Gartner researched 40 SD-WAN vendors and identified those among them that are moving the needle. SD-WAN is the first step beyond the build-your-own complicated methodology into a methodology of using cloud-based orchestration to optimize the deployment and management of the WAN.\u00a0 This is important because these vendors strongly believe that the next-generation WANs require new solutions that allow organizations to deploy quickly and securely while minimizing the operational overhead traditionally associated with building and maintaining networks.\nThe SD-WAN cloud-managed platform should be built to address not just fixed places, but people, places and things \u2014 utilizing both Broadband and LTE to give organizations the ability to have less complicated, less expensive, easier to manage and maintain, extensible, and more secure network deployments.\nMoving forward, organizations should be using the technologies that are available in software-defined and cloud-based applications to set up the next generation of networks to solve the business opportunities the digital transformation brings.