Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - OpenText Internet of Things Platform Integration and Automation

OpenText Webroot Unity - OpenText Internet of Things Platform Integration and Automation

Integrate OpenText Webroot Unity Security / Identity Access Management and OpenText Internet of Things Platform Internet of Things (IoT) apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between OpenText Webroot Unity and OpenText Internet of Things Platform

OpenText Webroot Unity and OpenText Internet of Things Platform complement each other well in environments where connected devices, sensors, and edge endpoints must be both operationally monitored and securely protected. Integrating them helps security teams and operations teams share device context, detect threats faster, and reduce risk across IoT-enabled business processes.

1. Secure onboarding of IoT devices into enterprise operations

Data flow: OpenText Internet of Things Platform to OpenText Webroot Unity

When new sensors, gateways, or connected controllers are registered in the IoT platform, device identity and network details can be sent to Webroot Unity for security policy assignment. This allows security teams to automatically apply endpoint protection standards to newly connected assets instead of relying on manual setup.

  • Automatically classify devices by site, function, or risk level
  • Apply security baselines for gateways and edge endpoints
  • Reduce exposure from unprotected devices during deployment

2. Threat detection based on abnormal IoT device behavior

Data flow: OpenText Internet of Things Platform to OpenText Webroot Unity

The IoT platform can identify unusual telemetry patterns such as unexpected traffic spikes, device restarts, or communication with unknown endpoints. These events can be forwarded to Webroot Unity to correlate with endpoint threat intelligence and trigger security investigations.

  • Detect compromised devices earlier using operational anomalies
  • Prioritize alerts based on device criticality and behavior changes
  • Support SOC analysts with richer context for incident triage

3. Automated isolation of compromised edge devices

Data flow: OpenText Webroot Unity to OpenText Internet of Things Platform

If Webroot Unity identifies malware, phishing, or ransomware activity on an endpoint or gateway, it can notify the IoT platform to isolate the affected device from operational workflows. This helps prevent spread to other connected assets and limits disruption to production or field operations.

  • Quarantine infected gateways or edge PCs
  • Pause data ingestion from suspicious devices
  • Protect plant, utility, or logistics networks from lateral movement

4. Security-aware monitoring dashboards for operations teams

Data flow: Bi-directional

Operational dashboards in the IoT platform can be enriched with security status from Webroot Unity, showing whether a device is healthy, at risk, or under investigation. This gives plant managers, maintenance teams, and operations leaders a single view of both performance and cyber risk.

  • Display security posture alongside sensor health and uptime
  • Help operations teams avoid using compromised devices
  • Improve decision-making during incidents or maintenance windows

5. Incident response workflows for connected operations

Data flow: Bi-directional

When a security event occurs, Webroot Unity can create an incident that includes IoT device metadata, location, and operational role from the IoT platform. In return, the IoT platform can provide live telemetry to help responders determine whether the issue is isolated or affecting a broader set of devices.

  • Accelerate root cause analysis with device context
  • Coordinate actions between security, OT, and IT teams
  • Reduce downtime by targeting only affected assets

6. Compliance reporting for regulated IoT environments

Data flow: Bi-directional

Organizations in utilities, manufacturing, and logistics often need evidence that connected devices are monitored and protected. The IoT platform can supply asset inventories, connectivity history, and operational logs, while Webroot Unity provides endpoint protection status, threat detections, and remediation records for audit reporting.

  • Support internal and external compliance reviews
  • Document security controls for connected assets
  • Improve traceability across operational and security teams

7. Risk-based maintenance prioritization for critical devices

Data flow: OpenText Webroot Unity to OpenText Internet of Things Platform

Security findings from Webroot Unity can be used by the IoT platform to adjust maintenance priorities. For example, devices with repeated malware detections or outdated protection can be flagged for immediate inspection, firmware review, or replacement before they cause operational issues.

  • Prioritize maintenance based on cyber risk and business criticality
  • Reduce unplanned outages caused by compromised edge devices
  • Align field service actions with security posture

These integrations help enterprises manage connected operations more safely by combining IoT visibility with endpoint security intelligence. The result is faster detection, better coordination, and stronger protection for distributed devices and the business processes they support.

How to integrate and automate OpenText Webroot Unity with OpenText Internet of Things Platform using OneTeg?