Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - NetX Integration and Automation
Data flow: NetX ? OpenText Webroot Unity
When employees access files, media, or shared resources stored in NetX, endpoint security status from OpenText Webroot Unity can be used to determine whether the device is trusted. If a device is flagged for malware, phishing activity, or ransomware indicators, access to sensitive NetX content can be restricted until remediation is complete. This helps protect intellectual property and reduces the risk of compromised endpoints being used to exfiltrate files.
Data flow: OpenText Webroot Unity ? NetX
OpenText Webroot Unity can send threat intelligence or device risk signals to NetX so that file sharing rules can be adjusted dynamically. For example, if a user endpoint is under active threat, NetX can automatically disable external sharing, limit downloads, or require additional approval for high-value content. This supports safer collaboration across departments and with external partners.
Data flow: Bi-directional
When OpenText Webroot Unity detects suspicious activity on an endpoint, it can notify NetX to identify recently accessed or downloaded files, helping security teams determine whether sensitive content may have been exposed. In return, NetX can provide file access logs and user activity history to accelerate investigation and containment. This shortens incident response time and improves forensic visibility.
Data flow: OpenText Webroot Unity ? NetX
If OpenText Webroot Unity identifies a device as infected or non-compliant, NetX can automatically quarantine that user from accessing specific repositories, shared workspaces, or regulated content libraries. This is especially useful for legal, finance, healthcare, and R and D teams that manage sensitive documents. The integration reduces the chance of lateral spread and unauthorized file manipulation.
Data flow: Bi-directional
NetX can classify content by sensitivity, while OpenText Webroot Unity can supply endpoint trust signals. Together, they can enforce stricter controls for regulated documents such as contracts, patient records, or financial reports. For example, only fully patched and malware-free devices may access certain folders, while high-risk endpoints are blocked or limited to read-only access. This helps support audit readiness and policy enforcement.
Data flow: OpenText Webroot Unity ? NetX
Security teams can feed endpoint risk data into NetX to support periodic access reviews. Users with repeated security incidents, outdated protection, or compromised devices can be flagged for review before their access to sensitive content is renewed. This gives IT and compliance teams a practical way to align endpoint security posture with content access governance.
Data flow: NetX ? OpenText Webroot Unity
NetX can identify users who regularly access critical or confidential content, such as executives, legal staff, or finance teams. That information can be used to apply stronger endpoint protection policies in OpenText Webroot Unity, such as tighter threat monitoring or enhanced alerting. This allows security teams to focus controls where the business impact of compromise would be highest.