Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - Centric Integration and Automation
Data flow: OpenText Webroot Unity ? Centric
When Webroot detects malware, phishing activity, or suspicious endpoint behavior on a designer?s or product manager?s device, it can send security alerts to Centric-related collaboration workflows. This helps teams quickly identify whether a compromised endpoint may have accessed product specifications, design files, or launch plans stored in Centric.
Data flow: OpenText Webroot Unity ? Centric
If Webroot identifies a high-risk endpoint, Centric can automatically limit access to product records, design assets, or approval workflows for the affected user until the device is remediated. This is especially useful for protecting confidential product formulations, technical drawings, and launch documentation.
Data flow: Bi-directional
Centric often involves external designers, suppliers, and manufacturing partners. Integration with Webroot can help verify endpoint security status before granting access to shared PLM projects. Centric can also notify security teams when external collaborators are added to sensitive product programs, enabling tighter monitoring.
Data flow: OpenText Webroot Unity ? Centric
When Webroot detects ransomware or suspicious encryption activity on a launch team member?s device, Centric can trigger incident response workflows for affected product programs. This may include pausing approvals, notifying stakeholders, and preserving version history for critical launch assets.
Data flow: OpenText Webroot Unity ? Centric
For distributed design and engineering teams, Webroot can continuously assess endpoint security posture and feed that status into Centric. If a remote device becomes untrusted, Centric can block downloads of sensitive CAD files, specifications, or supplier documentation until the endpoint is secured.
Data flow: Bi-directional
Centric maintains records of who accessed or changed product data, while Webroot provides endpoint threat telemetry. Combining both systems creates a stronger audit trail for investigations involving intellectual property theft, unauthorized downloads, or suspicious file transfers.
Data flow: Centric ? OpenText Webroot Unity
Centric can identify users, teams, or projects tied to high-value or confidential product lines and pass that context to Webroot for enhanced monitoring. Security teams can then apply stricter endpoint policies to devices used for strategic launches, premium product designs, or sensitive supplier negotiations.
Data flow: OpenText Webroot Unity ? Centric
Once Webroot confirms a device has been cleaned and is safe, Centric can automatically restore the user?s access to product workflows, approvals, and shared assets. This reduces downtime for design, sourcing, and product management teams while maintaining security controls.