There was a time when secure communications sat quietly in the background of enterprise IT. It was something deployed to satisfy a policy requirement, activated in specific scenarios, and largely ...