Companies should use a variety of tools and strategies, both technical and policy, to protect their IP from third-party risk.