Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - Google Analytics Integration and Automation
Data flow: Google Analytics ? OpenText Webroot Unity
Send website traffic patterns, landing page performance, and referral source data from Google Analytics into OpenText Webroot Unity to help security teams identify suspicious spikes in visits, unusual geographies, or abnormal referral behavior that may indicate bot activity, credential stuffing, or phishing campaigns targeting the organization.
Business value: Improves early detection of web-based threats and helps security teams prioritize investigation based on real user traffic context.
Data flow: OpenText Webroot Unity ? Google Analytics
Share endpoint security alerts, such as malware detections or compromised device indicators, with Google Analytics to segment traffic from potentially infected corporate devices. Marketing, ecommerce, and digital teams can exclude or analyze this traffic separately to avoid skewed campaign and conversion reporting.
Business value: Produces cleaner analytics data and reduces the risk of making business decisions based on compromised or non-human traffic.
Data flow: OpenText Webroot Unity ? Google Analytics
When OpenText Webroot Unity detects phishing-related threats on endpoints, send the affected user or device identifiers to Google Analytics for cross-analysis of recent site visits, form submissions, or login attempts. This helps security and digital teams determine whether users interacted with a malicious site before or after visiting legitimate company properties.
Business value: Supports faster incident triage and helps quantify the business impact of phishing attempts on customer or employee web activity.
Data flow: Google Analytics ? OpenText Webroot Unity
Use Google Analytics signals such as sudden traffic surges, abnormal session durations, repeated form submissions, or high bounce rates from the same source to trigger security review in OpenText Webroot Unity. This is useful for identifying bot traffic that may be inflating lead generation metrics or attempting automated abuse of web forms.
Business value: Protects marketing spend, improves lead quality, and helps security teams respond to abuse patterns that affect digital channels.
Data flow: Bi-directional
Combine OpenText Webroot Unity threat alerts with Google Analytics session and page path data to build a fuller picture of user activity before and after a security event. For example, if a device is flagged for ransomware behavior, analysts can review the user?s recent website interactions, downloads, or campaign touchpoints to understand exposure paths.
Business value: Shortens investigation time and improves root-cause analysis by linking endpoint incidents to web behavior.
Data flow: Google Analytics ? OpenText Webroot Unity
Track performance of high-value pages such as login portals, payment pages, and campaign landing pages in Google Analytics, then feed abnormal access patterns into OpenText Webroot Unity for security monitoring. This can help identify pages that are being targeted by automated attacks or credential harvesting attempts.
Business value: Strengthens protection for revenue-generating and identity-sensitive web assets.
Data flow: OpenText Webroot Unity ? Google Analytics
When a security incident affects a public-facing site or user population, push incident metadata from OpenText Webroot Unity into Google Analytics to measure changes in traffic, conversion rates, and user drop-off during the event window. This helps business teams assess operational impact and recovery progress.
Business value: Gives leadership and operations teams measurable insight into the business effect of security events.
Data flow: Google Analytics ? OpenText Webroot Unity
Use Google Analytics to identify the most visited pages, highest-converting campaigns, and critical customer journeys, then feed that prioritization into OpenText Webroot Unity policies or alerting workflows. Security teams can focus monitoring and response efforts on the endpoints and users most likely to interact with those assets.
Business value: Aligns cybersecurity controls with business-critical digital experiences and improves resource allocation.