Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - Air Inc. Integration and Automation
Below are practical integration scenarios that connect OpenText Webroot Unity?s endpoint security and threat intelligence capabilities with Air Inc.?s business workflows to improve security operations, reduce manual effort, and strengthen cross-team response.
Data flow: OpenText Webroot Unity to Air Inc.
When Webroot detects malware, ransomware, phishing activity, or a high-risk endpoint event, the alert can be automatically sent into Air Inc. as a case, task, or approval workflow. Security teams can route incidents to the right resolver group, attach endpoint details, and track remediation through to closure.
Data flow: OpenText Webroot Unity to Air Inc.
For suspicious devices, Webroot can trigger an Air Inc. approval workflow before quarantine, network isolation, or device remediation actions are applied. This is useful when business-critical endpoints need manager or IT approval before disruptive containment steps are executed.
Data flow: Air Inc. to OpenText Webroot Unity
When an employee termination or contractor offboarding request is initiated in Air Inc., the workflow can automatically notify Webroot to remove the device from active management, revoke endpoint access, or flag the asset for security review. This helps ensure that departing users do not retain protected device access longer than necessary.
Data flow: Air Inc. to OpenText Webroot Unity
When a new laptop or workstation request is approved in Air Inc., the integration can trigger a security enrollment step in Webroot to confirm the device is protected before it is handed to the user. This can include verifying agent installation, policy assignment, and baseline protection status.
Data flow: Bi-directional
Webroot threat intelligence can flag a user or endpoint as high risk, while Air Inc. can enrich the case with business context such as department, manager, location, or asset owner. This creates a more complete review process for security operations, service desk, and compliance teams.
Data flow: OpenText Webroot Unity to Air Inc.
Webroot security status, policy compliance, and incident history can be pushed into Air Inc. to support internal control checks, audit requests, or compliance workflows. This is especially useful for organizations that need proof of endpoint protection coverage and remediation activity.
Data flow: OpenText Webroot Unity to Air Inc.
When a user reports a device issue in Air Inc., Webroot can automatically enrich the ticket with endpoint health, recent detections, policy status, and threat severity. Service desk agents can then resolve issues faster without switching between tools or requesting additional diagnostics.
Data flow: Bi-directional
After Webroot identifies a threat, Air Inc. can create remediation tasks for patching, user communication, device reimaging, or policy updates. Once the task is completed in Air Inc., the closure status can be sent back to Webroot to confirm remediation and close the incident loop.