Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - Plytix Integration and Automation
Data flow: OpenText Webroot Unity ? Plytix
Use Webroot Unity security events to identify compromised endpoints used by product, catalog, or merchandising staff and restrict access to Plytix until the device is remediated. This helps prevent unauthorized changes to product records, pricing, and digital assets from infected or high-risk devices.
Business value: Reduces the risk of data tampering, account misuse, and operational disruption in product information management.
Data flow: OpenText Webroot Unity ? Plytix
Integrate endpoint threat intelligence with Plytix access controls so users on devices flagged for malware, phishing, or ransomware activity are automatically blocked or limited to read-only access. This is especially useful for distributed teams, agencies, and remote workers managing product content.
Business value: Protects sensitive product data while maintaining productivity for low-risk users.
Data flow: Bi-directional
When Webroot Unity detects a security incident on a user device, trigger a review workflow in Plytix for any product records edited during the incident window. This allows product operations or data governance teams to validate recent changes to descriptions, attributes, images, and channel-specific content before publication.
Business value: Improves data integrity and reduces the chance of malicious or accidental content corruption.
Data flow: OpenText Webroot Unity ? Plytix
Use endpoint protection alerts to quarantine devices that handle uploads of product images, spec sheets, and marketing files into Plytix. If a device shows signs of ransomware or file-based malware, block further asset uploads until the endpoint is cleared.
Business value: Prevents infected files from entering the product content supply chain and affecting downstream eCommerce or marketplace channels.
Data flow: OpenText Webroot Unity ? Plytix
Before granting new users access to Plytix, verify that their assigned endpoints meet security standards in Webroot Unity. This can be used for new hires, contractors, or external content teams who need access to product data management workflows.
Business value: Standardizes onboarding and reduces the risk of introducing unsecured devices into product operations.
Data flow: Bi-directional
Combine Webroot Unity security logs with Plytix user activity logs to create a complete audit trail for product data governance. Compliance teams can correlate endpoint threats with product record edits, exports, and approvals to investigate suspicious activity and support internal controls.
Business value: Strengthens audit readiness and improves visibility across security and product data management processes.
Data flow: Plytix ? OpenText Webroot Unity
If Plytix detects unusual bulk exports, repeated downloads, or abnormal access patterns, send an alert to Webroot Unity or the security operations team for endpoint investigation. This can help identify whether the activity is linked to compromised credentials, insider risk, or malware-driven data theft.
Business value: Adds a security layer to protect product master data and reduce exposure of sensitive commercial information.
Data flow: OpenText Webroot Unity ? Plytix
When Webroot Unity flags a user device as compromised, automatically notify product operations, IT support, and catalog managers in Plytix-related workflows. The user can be temporarily removed from approval queues or publishing tasks until the endpoint is cleaned and revalidated.
Business value: Keeps product publishing workflows moving while preventing risky users from affecting live catalog data.