Using end-to-end encrypted services is quickly becoming a critical component of how enterprises meet regulations and ensure data sovereignty. This presentation will provide an inside look at the value E2EE services offer, how it works in practice, the tradeoffs of using it, and practical strategies currently being investigated to try to bridge features gap between E2EE and non-E2EE products.