Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - Centric Integration and Automation

OpenText Webroot Unity - Centric Integration and Automation

Integrate OpenText Webroot Unity Security / Identity Access Management and Centric Product Lifecycle Management apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between OpenText Webroot Unity and Centric

1. Secure Product Development Workspaces

Data flow: OpenText Webroot Unity ? Centric

When Webroot detects malware, phishing activity, or suspicious endpoint behavior on a designer?s or product manager?s device, it can send security alerts to Centric-related collaboration workflows. This helps teams quickly identify whether a compromised endpoint may have accessed product specifications, design files, or launch plans stored in Centric.

  • Flags potentially compromised users or devices involved in product development
  • Supports faster containment of security incidents affecting PLM workspaces
  • Reduces risk of unauthorized access to sensitive product data

2. Restrict Access to Product Data After Security Events

Data flow: OpenText Webroot Unity ? Centric

If Webroot identifies a high-risk endpoint, Centric can automatically limit access to product records, design assets, or approval workflows for the affected user until the device is remediated. This is especially useful for protecting confidential product formulations, technical drawings, and launch documentation.

  • Temporarily suspends access for compromised users
  • Protects intellectual property during active threat events
  • Supports policy-based access control tied to endpoint health

3. Security-Aware Collaboration for External Partners

Data flow: Bi-directional

Centric often involves external designers, suppliers, and manufacturing partners. Integration with Webroot can help verify endpoint security status before granting access to shared PLM projects. Centric can also notify security teams when external collaborators are added to sensitive product programs, enabling tighter monitoring.

  • Checks endpoint risk before onboarding external users
  • Improves governance for supplier and contractor collaboration
  • Reduces exposure of confidential product information to insecure devices

4. Incident Response for Product Launch Teams

Data flow: OpenText Webroot Unity ? Centric

When Webroot detects ransomware or suspicious encryption activity on a launch team member?s device, Centric can trigger incident response workflows for affected product programs. This may include pausing approvals, notifying stakeholders, and preserving version history for critical launch assets.

  • Prevents corrupted or tampered files from moving through launch stages
  • Alerts cross-functional teams in product, legal, and operations
  • Maintains continuity of product release governance

5. Protect Sensitive Product Data During Remote Work

Data flow: OpenText Webroot Unity ? Centric

For distributed design and engineering teams, Webroot can continuously assess endpoint security posture and feed that status into Centric. If a remote device becomes untrusted, Centric can block downloads of sensitive CAD files, specifications, or supplier documentation until the endpoint is secured.

  • Supports secure remote access to PLM content
  • Reduces risk from unmanaged or infected home devices
  • Helps enforce security controls without slowing collaboration

6. Audit Trail Correlation for Compliance and IP Protection

Data flow: Bi-directional

Centric maintains records of who accessed or changed product data, while Webroot provides endpoint threat telemetry. Combining both systems creates a stronger audit trail for investigations involving intellectual property theft, unauthorized downloads, or suspicious file transfers.

  • Correlates user activity with endpoint security events
  • Improves forensic analysis after a suspected breach
  • Supports compliance reporting for regulated product development

7. Prioritize Security for High-Value Product Programs

Data flow: Centric ? OpenText Webroot Unity

Centric can identify users, teams, or projects tied to high-value or confidential product lines and pass that context to Webroot for enhanced monitoring. Security teams can then apply stricter endpoint policies to devices used for strategic launches, premium product designs, or sensitive supplier negotiations.

  • Aligns endpoint protection with business-critical product programs
  • Enables risk-based security policies by project sensitivity
  • Improves protection for launch-critical teams and assets

8. Faster Recovery After Endpoint Remediation

Data flow: OpenText Webroot Unity ? Centric

Once Webroot confirms a device has been cleaned and is safe, Centric can automatically restore the user?s access to product workflows, approvals, and shared assets. This reduces downtime for design, sourcing, and product management teams while maintaining security controls.

  • Automates re-enablement after threat remediation
  • Minimizes disruption to product development timelines
  • Helps security and business teams work from the same status signal

How to integrate and automate OpenText Webroot Unity with Centric using OneTeg?