Watch this video on YouTube
What would be the most effective way to ensure the security of third-party software being integrated into your organization's existing infrastructure?