In the world of compliance, securing email is a lot like sex: everybody does it, few discuss it, and none really know whether their technique is quite right.

By comparison, many other compliance challenges pose relatively simple obstacles for IT staff. A finance application, for example, can be sealed off from workers without proper access authority, and tasks can be audited and automated to ensure proper segregation of duties and to minimize manual processes. Similarly, a whistleblower system can run behind the comforting anonymity of a third-party provider.