Using third-party security solutions