Home | Connectors | OpenText Lens - Data Visibility | OpenText Lens - Data Visibility - OpenText Webroot Unity Integration and Automation
Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity
OpenText Lens identifies endpoints, file shares, and user repositories containing sensitive or regulated unstructured data such as customer records, contracts, or financial documents. That inventory is then sent to OpenText Webroot Unity so security teams can apply stricter endpoint controls, enhanced monitoring, or conditional access policies to devices that store high-risk content.
Business value: Reduces the chance of data theft or ransomware impact by focusing endpoint protection on the devices most likely to expose critical information.
Data flow: Bi-directional
OpenText Webroot Unity detects compromised or suspicious endpoints, such as devices affected by malware, phishing, or ransomware behavior. OpenText Lens then checks whether those devices contain sensitive or obsolete unstructured data and flags the business impact of the incident. Security and data governance teams can use this combined view to decide whether to isolate the device, revoke access, or trigger data remediation.
Business value: Improves incident prioritization by linking endpoint threats to the sensitivity of the data stored on the affected device.
Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity
Before endpoints are reimaged, retired, or replaced, OpenText Lens identifies redundant, obsolete, or trivial files and highlights content that must be retained for legal or operational reasons. OpenText Webroot Unity can then enforce endpoint cleanup actions, support secure wipe workflows, and confirm that devices are protected during the decommissioning process.
Business value: Lowers storage costs, reduces data sprawl, and helps prevent sensitive data from remaining on retired devices.
Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity
During endpoint refresh, operating system migration, or hardware replacement programs, OpenText Lens inventories unstructured data on user devices and classifies what should be migrated, archived, or deleted. OpenText Webroot Unity supports secure transition by protecting endpoints during the migration window and helping security teams monitor devices that carry high-value data.
Business value: Speeds migration projects while reducing the risk of moving unnecessary or sensitive content to new devices.
Data flow: OpenText Lens - Data Visibility ? OpenText Webroot Unity
OpenText Lens identifies endpoints that store regulated content such as personal data, legal records, or intellectual property. OpenText Webroot Unity uses that classification to apply differentiated endpoint security policies, such as tighter malware controls, restricted USB usage, or stronger alerting for devices handling regulated information.
Business value: Helps compliance and security teams align endpoint controls with data sensitivity requirements and audit expectations.
Data flow: OpenText Webroot Unity ? OpenText Lens - Data Visibility
When OpenText Webroot Unity detects a phishing attempt, malware infection, or suspicious user activity, it can notify OpenText Lens to assess whether the impacted user or device holds sensitive business content. This enables data governance teams to quickly determine whether the event could lead to exposure of confidential files, and whether additional remediation such as file review, access review, or legal hold is needed.
Business value: Shortens response time and helps organizations focus containment efforts where data exposure risk is highest.
Data flow: Bi-directional
OpenText Lens provides ongoing visibility into where sensitive or obsolete unstructured data resides, while OpenText Webroot Unity supplies endpoint threat posture and protection status. Together, they can feed a consolidated risk dashboard for IT, security, and compliance leaders showing which devices are both poorly protected and highly exposed to sensitive content.
Business value: Creates a shared operational view that supports better governance decisions, budget prioritization, and executive reporting.
Data flow: OpenText Webroot Unity ? OpenText Lens - Data Visibility
After OpenText Webroot Unity identifies a compromised endpoint, OpenText Lens can scan the affected repositories to locate sensitive files, duplicate copies, and obsolete content that should be removed or archived. Security, legal, and records management teams can then coordinate remediation actions based on the data classification results.
Business value: Reduces the amount of exposed content on compromised devices and supports faster, more controlled recovery.