Home | Connectors | OpenText Lens - Data Visibility | OpenText Lens - Data Visibility - OpenText Webroot Unity Integration and Automation

OpenText Lens - Data Visibility - OpenText Webroot Unity Integration and Automation

Integrate OpenText Lens - Data Visibility Analytics and OpenText Webroot Unity Security / Identity Access Management apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between OpenText Lens - Data Visibility and OpenText Webroot Unity

1. Sensitive Content Discovery to Endpoint Risk Prioritization

Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity

OpenText Lens identifies endpoints, file shares, and user repositories containing sensitive or regulated unstructured data such as customer records, contracts, or financial documents. That inventory is then sent to OpenText Webroot Unity so security teams can apply stricter endpoint controls, enhanced monitoring, or conditional access policies to devices that store high-risk content.

Business value: Reduces the chance of data theft or ransomware impact by focusing endpoint protection on the devices most likely to expose critical information.

2. High-Risk Device Alerting Based on Data Exposure

Data flow: Bi-directional

OpenText Webroot Unity detects compromised or suspicious endpoints, such as devices affected by malware, phishing, or ransomware behavior. OpenText Lens then checks whether those devices contain sensitive or obsolete unstructured data and flags the business impact of the incident. Security and data governance teams can use this combined view to decide whether to isolate the device, revoke access, or trigger data remediation.

Business value: Improves incident prioritization by linking endpoint threats to the sensitivity of the data stored on the affected device.

3. Data Cleanup Before Endpoint Decommissioning or Reimaging

Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity

Before endpoints are reimaged, retired, or replaced, OpenText Lens identifies redundant, obsolete, or trivial files and highlights content that must be retained for legal or operational reasons. OpenText Webroot Unity can then enforce endpoint cleanup actions, support secure wipe workflows, and confirm that devices are protected during the decommissioning process.

Business value: Lowers storage costs, reduces data sprawl, and helps prevent sensitive data from remaining on retired devices.

4. Migration Readiness and Secure Endpoint Transition

Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity

During endpoint refresh, operating system migration, or hardware replacement programs, OpenText Lens inventories unstructured data on user devices and classifies what should be migrated, archived, or deleted. OpenText Webroot Unity supports secure transition by protecting endpoints during the migration window and helping security teams monitor devices that carry high-value data.

Business value: Speeds migration projects while reducing the risk of moving unnecessary or sensitive content to new devices.

5. Compliance-Driven Endpoint Segmentation

Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity

OpenText Lens identifies endpoints that store regulated content such as personal data, legal records, or intellectual property. OpenText Webroot Unity uses that classification to apply differentiated endpoint security policies, such as tighter malware controls, restricted USB usage, or stronger alerting for devices handling regulated information.

Business value: Helps compliance and security teams align endpoint controls with data sensitivity requirements and audit expectations.

6. Phishing and Malware Response for Data-Heavy Users

Data flow: OpenText Webroot Unity ? OpenText Lens - Data Visibility

When OpenText Webroot Unity detects a phishing attempt, malware infection, or suspicious user activity, it can notify OpenText Lens to assess whether the impacted user or device holds sensitive business content. This enables data governance teams to quickly determine whether the event could lead to exposure of confidential files, and whether additional remediation such as file review, access review, or legal hold is needed.

Business value: Shortens response time and helps organizations focus containment efforts where data exposure risk is highest.

7. Continuous Data and Endpoint Risk Reporting

Data flow: Bi-directional

OpenText Lens provides ongoing visibility into where sensitive or obsolete unstructured data resides, while OpenText Webroot Unity supplies endpoint threat posture and protection status. Together, they can feed a consolidated risk dashboard for IT, security, and compliance leaders showing which devices are both poorly protected and highly exposed to sensitive content.

Business value: Creates a shared operational view that supports better governance decisions, budget prioritization, and executive reporting.

8. Secure Data Remediation Workflow for Compromised Endpoints

Data flow: OpenText Webroot Unity ? OpenText Lens - Data Visibility

After OpenText Webroot Unity identifies a compromised endpoint, OpenText Lens can scan the affected repositories to locate sensitive files, duplicate copies, and obsolete content that should be removed or archived. Security, legal, and records management teams can then coordinate remediation actions based on the data classification results.

Business value: Reduces the amount of exposed content on compromised devices and supports faster, more controlled recovery.

How to integrate and automate OpenText Lens - Data Visibility with OpenText Webroot Unity using OneTeg?