Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - Google Document AI Integration and Automation

OpenText Webroot Unity - Google Document AI Integration and Automation

Integrate OpenText Webroot Unity Security / Identity Access Management and Google Document AI Analytics apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between OpenText Webroot Unity and Google Document AI

OpenText Webroot Unity provides endpoint security, threat detection, and centralized cyber defense, while Google Document AI extracts structured data from documents using OCR and machine learning. Together, they can improve security operations, automate document-heavy workflows, and reduce manual effort across IT, compliance, and business teams.

  • Automated phishing and malware document triage

    Data flow: OpenText Webroot Unity to Google Document AI

    When Webroot detects suspicious email attachments, downloaded files, or endpoint-executed documents, the file can be sent to Document AI for content extraction and classification. Security teams can quickly identify invoice fraud, fake HR forms, malicious macros, or impersonation documents without manually opening files. This reduces analyst workload and speeds up incident triage.

  • Security incident evidence extraction from documents

    Data flow: OpenText Webroot Unity to Google Document AI

    During an endpoint security incident, Webroot can forward quarantined documents, logs, or exported reports to Document AI to extract key details such as sender names, invoice numbers, account references, or embedded URLs. The extracted data can be attached to incident tickets in SIEM or ITSM systems, helping investigators build a faster and more complete case file.

  • Automated compliance review of security-related documents

    Data flow: Google Document AI to OpenText Webroot Unity

    Document AI can process policy acknowledgements, third-party security questionnaires, audit evidence, and vendor contracts to extract relevant clauses, dates, and signatures. The results can be used to trigger Webroot policy actions, such as flagging devices associated with non-compliant users or escalating endpoints tied to expired vendor access approvals. This supports governance and audit readiness.

  • Endpoint risk enrichment from scanned identity and access documents

    Data flow: Google Document AI to OpenText Webroot Unity

    HR onboarding forms, contractor IDs, and access request documents processed by Document AI can be used to validate user identity and extract employment or contract details. That information can then be passed to Webroot to support device trust decisions, such as applying stricter endpoint controls for temporary staff, unmanaged devices, or high-risk user groups. This improves access governance and reduces exposure.

  • Automated secure handling of scanned invoices and payment documents

    Data flow: OpenText Webroot Unity to Google Document AI

    If Webroot detects suspicious invoice attachments or payment requests on endpoints used by finance teams, those files can be routed to Document AI for extraction and validation. Finance operations can compare vendor names, bank details, and invoice amounts against approved records before any payment is processed. This helps prevent business email compromise and invoice fraud.

  • Threat intelligence tagging for document repositories

    Data flow: Bi-directional

    Document AI can extract document metadata from shared folders, case management systems, or content repositories, while Webroot can provide threat indicators for files or sources associated with known malicious activity. Together, they can tag documents by risk level, source trust, and content type. This is useful for legal, records management, and security teams that need to prioritize review of high-risk documents.

  • Automated case creation for suspicious document activity

    Data flow: OpenText Webroot Unity to Google Document AI

    When Webroot identifies repeated access to suspicious files, ransomware-encrypted documents, or phishing payloads, Document AI can extract document attributes and populate structured fields in an incident or case management workflow. This allows security operations to create more complete tickets with less manual data entry and faster handoff to legal, HR, or compliance teams when needed.

  • Document-driven endpoint policy exceptions and approvals

    Data flow: Google Document AI to OpenText Webroot Unity

    Document AI can process approval forms, exception requests, and signed risk acceptances to extract approver identity, expiration dates, and scope of exception. That information can be used to update Webroot endpoint policies for specific users or devices, such as temporary exclusions for software installation or controlled access for remediation activities. This creates a more auditable and efficient exception process.

How to integrate and automate OpenText Webroot Unity with Google Document AI using OneTeg?