Home | Connectors | OpenText File 360 | OpenText File 360 - OpenText Webroot Unity Integration and Automation
OpenText File 360 and OpenText Webroot Unity complement each other well in an enterprise environment: File 360 governs secure file sharing and collaboration, while Webroot Unity protects endpoints that access, download, sync, and share those files. Integrating the two platforms helps reduce data exposure, strengthen compliance, and improve security operations across business and IT teams.
Data flow: OpenText Webroot Unity to OpenText File 360
When Webroot Unity identifies a device as healthy and compliant, users can be allowed to access File 360 content. If a device is flagged for malware, ransomware, or suspicious behavior, access to sensitive folders can be restricted until the endpoint is remediated.
Data flow: OpenText Webroot Unity to OpenText File 360
If Webroot Unity detects malicious activity associated with a file that was recently synced or shared through File 360, the file can be flagged for review, access can be revoked, or the file can be removed from shared locations. This helps security teams respond quickly to threats that may have entered through collaboration workflows.
Data flow: OpenText Webroot Unity to OpenText File 360
Webroot Unity can provide risk signals such as repeated phishing exposure, active malware, or device compromise. File 360 can use those signals to temporarily restrict external sharing, downloads, or sync actions for affected users until the endpoint is cleared.
Data flow: Bi-directional
File 360 audit logs showing who accessed, downloaded, or shared files can be correlated with Webroot Unity endpoint alerts to build a complete investigation timeline. This is valuable for compliance teams, internal audit, and security operations when reviewing suspected data loss or policy violations.
Data flow: Bi-directional
Organizations can allow external contractors, suppliers, or partners to access File 360 only from devices protected by Webroot Unity or meeting defined security standards. This is especially useful for projects involving sensitive documents, legal files, or regulated information.
Data flow: OpenText Webroot Unity to OpenText File 360
When Webroot Unity detects ransomware behavior on an endpoint, File 360 can automatically suspend sync activity, revoke active sessions, or block file downloads from that device. This prevents encrypted or corrupted files from being propagated across shared workspaces.
Data flow: OpenText File 360 to OpenText Webroot Unity
File 360 can classify or tag highly sensitive content such as legal, finance, HR, or customer records. Those classifications can be used to trigger stricter endpoint monitoring in Webroot Unity for users handling that content, such as enhanced alerting or tighter device controls.
Data flow: Bi-directional
Security administrators can combine File 360 access and sharing reports with Webroot Unity endpoint health dashboards to manage risk more effectively. This gives IT and security leaders a unified view of which users, devices, and files present the highest exposure.