Home | Connectors | Consonance | Consonance - OpenText Webroot Unity Integration and Automation
Data flow: Consonance ? OpenText Webroot Unity
When new users are added in Consonance for editors, freelancers, designers, rights managers, or production staff, the integration can automatically trigger endpoint security enrollment or policy assignment in Webroot Unity. This ensures that every device used to access manuscript files, contracts, royalty data, and title metadata is protected before users begin work.
Data flow: Consonance ? OpenText Webroot Unity
Consonance can flag projects involving embargoed titles, celebrity authors, high-value rights deals, or sensitive acquisition documents. That project context can be sent to Webroot Unity to apply stricter endpoint controls for users working on those assets, such as enhanced malware protection, tighter phishing defenses, or more frequent security checks.
Data flow: OpenText Webroot Unity ? Consonance
If Webroot Unity detects malware, ransomware, or suspicious activity on a device used by a publisher employee or contractor, the alert can be pushed into Consonance and linked to the affected title, project, or team member. This gives editorial and production managers immediate visibility into whether a manuscript, cover file, or schedule may be at risk.
Data flow: Bi-directional
Consonance manages title metadata, schedules, and distribution-ready information, while Webroot Unity validates the security posture of the endpoint used to make those updates. If a device fails security checks, Consonance can restrict sensitive actions such as publishing final metadata, releasing files to distribution partners, or approving last-minute changes.
Data flow: Consonance ? OpenText Webroot Unity
Publishers often work with external designers, proofreaders, illustrators, and production vendors who access files outside the core corporate network. Consonance can identify external collaborators assigned to a title and send that information to Webroot Unity so their endpoints receive the appropriate security posture before they access shared assets or workflow tasks.
Data flow: OpenText Webroot Unity ? Consonance
When Webroot Unity identifies a serious threat on a user device, Consonance can automatically place related publishing tasks on hold. For example, if a production editor?s laptop is infected, the system can pause manuscript approvals, cover uploads, or final proof signoff until IT confirms the device is clean.
Data flow: Bi-directional
Consonance provides workflow history for manuscript handling, approvals, and rights activity, while Webroot Unity provides endpoint security event logs and threat history. Combining both sources creates a stronger audit trail for publishers that need to demonstrate control over sensitive content, third-party access, and production environments.
Data flow: OpenText Webroot Unity ? Consonance
Rights and royalty teams often handle bank details, contract terms, and partner communications that are attractive targets for phishing. If Webroot Unity detects a phishing attempt or credential risk on a user account tied to Consonance, the integration can trigger additional verification or temporarily restrict access to royalty and rights modules until the risk is resolved.