Home | Connectors | OpenText Extended ECM - Business Workspaces | OpenText Extended ECM - Business Workspaces - OpenText Webroot Unity Integration and Automation

OpenText Extended ECM - Business Workspaces - OpenText Webroot Unity Integration and Automation

Integrate OpenText Extended ECM - Business Workspaces Document Management and OpenText Webroot Unity Security / Identity Access Management apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between OpenText Extended ECM - Business Workspaces and OpenText Webroot Unity

1. Security Incident Workspace for Endpoint Threat Investigations

Data flow: OpenText Webroot Unity ? OpenText Extended ECM - Business Workspaces

When Webroot Unity detects malware, ransomware, or suspicious endpoint activity, it can automatically create or update a security incident workspace in Extended ECM. The workspace stores alert details, affected device information, remediation steps, analyst notes, and supporting evidence such as logs or screenshots.

Business value: Security teams get a complete case file in one governed location, improving incident response speed, auditability, and handoff between SOC, IT, and compliance teams.

2. Endpoint Risk Profile Attached to Business Workspaces

Data flow: OpenText Webroot Unity ? OpenText Extended ECM - Business Workspaces

For business objects such as customer accounts, projects, or cases, Extended ECM can display the current security status of associated endpoints used by employees or contractors. Webroot Unity can provide device health, threat history, and policy compliance indicators that are linked to the relevant workspace.

Business value: Business users and managers can see whether a device involved in a customer engagement or project is secure before sharing sensitive documents or approving access.

3. Security Exception Approval and Documentation Workflow

Data flow: OpenText Extended ECM - Business Workspaces ? OpenText Webroot Unity

When a business team needs a temporary security exception, such as allowing a blocked application or excluding a device from a policy during a project, the request can be initiated in Extended ECM. The workspace routes the request for approval, stores justification and supporting documents, and then sends the approved exception details to Webroot Unity for enforcement.

Business value: This creates a controlled, auditable process for security exceptions while reducing email-based approvals and policy drift.

4. Compliance Evidence Repository for Endpoint Security Controls

Data flow: OpenText Webroot Unity ? OpenText Extended ECM - Business Workspaces

Webroot Unity can feed security reports, policy compliance summaries, threat remediation records, and device protection status into compliance workspaces in Extended ECM. These workspaces can be organized by audit, regulation, business unit, or control framework.

Business value: Compliance and audit teams gain centralized evidence for proving endpoint protection coverage, remediation timeliness, and policy enforcement without manually collecting reports from multiple systems.

5. Onboarding and Offboarding Security Workspace

Data flow: Bi-directional

During employee onboarding or offboarding, Extended ECM can manage the business process, documents, approvals, and task tracking. Once the process reaches a security-related step, it can trigger Webroot Unity actions such as enrolling a device, applying endpoint protection policies, or confirming device removal and cleanup during offboarding.

Business value: HR, IT, and security teams work from a single process record, reducing gaps in device protection during joiner, mover, and leaver events.

6. Customer or Project Workspace Risk Monitoring

Data flow: OpenText Webroot Unity ? OpenText Extended ECM - Business Workspaces

For high-value customer accounts or sensitive projects, Webroot Unity can provide endpoint threat alerts related to users assigned to the workspace. Extended ECM can surface these alerts alongside contracts, deliverables, and communications so project managers can quickly assess whether a security event may affect deadlines or data exposure risk.

Business value: Business leaders can make faster decisions when endpoint security incidents may impact customer commitments, regulated data, or confidential project materials.

7. Security Remediation Case Management

Data flow: OpenText Webroot Unity ? OpenText Extended ECM - Business Workspaces ? OpenText Webroot Unity

When Webroot Unity flags a device, Extended ECM can create a remediation workspace that assigns tasks to IT support, records investigation notes, stores evidence, and tracks approvals for closure. Once remediation is complete, the workspace can send closure status back to Webroot Unity for case resolution and reporting.

Business value: This improves accountability and ensures every security event has a documented remediation trail, reducing repeat incidents and improving service quality.

8. Policy Change Governance and Approval Tracking

Data flow: OpenText Extended ECM - Business Workspaces ? OpenText Webroot Unity

Security policy changes, such as updates to endpoint protection rules, phishing controls, or device exclusions, can be governed through an Extended ECM workspace. The workspace captures the change request, business justification, risk review, and approvals before sending the final approved change to Webroot Unity for implementation.

Business value: Organizations gain stronger governance over security policy changes, with clear accountability and reduced risk of unauthorized or poorly documented updates.

How to integrate and automate OpenText Extended ECM - Business Workspaces with OpenText Webroot Unity using OneTeg?