Home | Connectors | Adobe Workfront | Adobe Workfront - OpenText Webroot Unity Integration and Automation
Data flow: Adobe Workfront ? OpenText Webroot Unity
When a marketing team submits a new campaign, landing page, or creative asset for production in Adobe Workfront, the project can automatically trigger a security review in OpenText Webroot Unity for any associated files, links, or external content sources. This helps security teams identify malware, phishing risks, or suspicious attachments before assets are distributed internally or published externally.
Business value: Reduces the risk of infected creative files entering the production pipeline and improves coordination between marketing and cybersecurity teams.
Data flow: Adobe Workfront ? OpenText Webroot Unity ? Adobe Workfront
Before approved creative assets are shared with agencies, freelancers, or external partners, Workfront can send the final deliverables and related metadata to Webroot Unity for endpoint and file threat validation. Once the scan is complete, the security status is returned to Workfront and used as a release condition for distribution.
Business value: Ensures only verified assets are shared externally, lowering the chance of malware propagation through creative collaboration channels.
Data flow: OpenText Webroot Unity ? Adobe Workfront
If Webroot Unity detects ransomware, malware, or phishing activity on a device used by a designer, marketer, or agency user, it can notify Workfront to place related projects on hold. Tasks assigned to the affected user can be paused, reassigned, or escalated to prevent compromised endpoints from continuing to handle sensitive campaign materials.
Business value: Limits operational disruption and reduces the risk of compromised users affecting active marketing deliverables.
Data flow: Adobe Workfront ? OpenText Webroot Unity
When Workfront is used to onboard contractors, agencies, or temporary creative staff, it can trigger a security provisioning workflow in Webroot Unity to ensure their managed devices are enrolled, protected, and compliant before they receive project access. Workfront can track onboarding status and block task assignment until security requirements are met.
Business value: Creates a controlled onboarding process that aligns project access with endpoint security standards.
Data flow: Bi-directional
For major product launches or high-visibility campaigns, Workfront can flag critical project milestones and send them to Webroot Unity for enhanced monitoring during launch windows. If Webroot detects elevated threat activity on endpoints tied to the campaign, it can return alerts to Workfront so project managers can escalate, delay, or reroute launch tasks.
Business value: Protects business-critical launches by linking project urgency with real-time security posture.
Data flow: OpenText Webroot Unity ? Adobe Workfront
Workfront project dashboards can display endpoint security indicators for users assigned to sensitive workstreams, such as campaign production, executive communications, or regulated content. Security status from Webroot Unity can help project managers understand whether a task owner is operating from a compliant and protected device before approving final work.
Business value: Gives operational leaders better visibility into security-related delivery risks without leaving the project management environment.
Data flow: OpenText Webroot Unity ? Adobe Workfront
After Webroot Unity resolves a security incident, it can notify Workfront to reopen paused tasks, reassign work from affected users, and generate follow-up actions such as file revalidation or proof reapproval. This is especially useful for creative teams working under tight deadlines where continuity must be restored quickly and safely.
Business value: Speeds recovery after security incidents and helps teams resume work with clear accountability.
Data flow: Bi-directional
Workfront can provide project records, approval histories, and asset handoff details, while Webroot Unity can contribute endpoint protection logs and incident records. Together, these data sets support audit reporting for organizations that need to demonstrate secure handling of creative assets, controlled approvals, and protected user environments.
Business value: Strengthens governance, supports internal audits, and helps prove that marketing operations follow security controls.