Home | Connectors | HTTP | HTTP - OpenText Webroot Unity Integration and Automation
HTTP-based integration can act as the transport layer for connecting OpenText Webroot Unity with other enterprise systems, enabling real-time security events, automated response workflows, and centralized reporting. The following use cases focus on practical business outcomes and operational efficiency.
Data flow: OpenText Webroot Unity to HTTP endpoint
When Webroot detects malware, phishing, or ransomware activity on an endpoint, it can send an HTTP webhook to an ITSM platform or internal incident API. The receiving system can automatically create a high-priority ticket, assign it to the security operations team, and attach endpoint details, threat type, and remediation status. This reduces manual triage time and improves incident response consistency.
Data flow: Bi-directional
Security orchestration tools can call HTTP APIs to query Webroot for endpoint status and threat context, then trigger response actions such as isolating a device, initiating a scan, or updating policy assignments. This supports faster containment of active threats and helps security teams standardize response playbooks across multiple sites and device groups.
Data flow: OpenText Webroot Unity to HTTP-based log collection or SIEM ingestion endpoint
Webroot security events can be pushed over HTTP to a SIEM platform for correlation with firewall, identity, and email security logs. This gives the SOC a unified view of suspicious activity, improves threat hunting, and supports compliance reporting with a single source of security telemetry.
Data flow: OpenText Webroot Unity to HTTP notification service
When a device is quarantined or a threat is detected, Webroot can trigger an HTTP request to a notification service that sends email, SMS, or collaboration alerts to the affected user and help desk. The message can include remediation steps, expected downtime, and support contact details, reducing confusion and speeding user recovery.
Data flow: HTTP-based management system to OpenText Webroot Unity
Device inventory, user group membership, or asset criticality data from an identity management or endpoint management platform can be sent via HTTP API to update Webroot policies. For example, executive laptops, finance devices, and shared kiosks can receive different protection profiles based on business risk, improving governance and reducing policy drift.
Data flow: Bi-directional
When a new laptop is provisioned in an endpoint management system, an HTTP call can register the device in Webroot and apply the correct security policy. Similarly, when an employee leaves or a device is retired, the endpoint can be removed from active protection groups and archived. This streamlines lifecycle management and reduces exposure from unmanaged devices.
Data flow: OpenText Webroot Unity to HTTP reporting API
Webroot can expose endpoint protection status, threat counts, and remediation metrics through HTTP endpoints that feed business intelligence dashboards. Security leaders can track coverage by region, department, or device type, while compliance teams can monitor whether critical systems remain protected and patched according to policy.
These integrations help organizations move from reactive endpoint protection to coordinated, automated security operations, improving response speed, visibility, and control across IT and security teams.