Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - PoolParty Integration and Automation

OpenText Webroot Unity - PoolParty Integration and Automation

Integrate OpenText Webroot Unity Security / Identity Access Management and PoolParty Artificial intelligence (AI) apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between OpenText Webroot Unity and PoolParty

1. Security-tagged content classification for sensitive digital assets

Data flow: OpenText Webroot Unity ? PoolParty

When Webroot detects files, endpoints, or user activity associated with malware, phishing, or ransomware, security events and file indicators can be pushed into PoolParty as semantic metadata. PoolParty can then classify related documents, assets, or knowledge objects as high risk, restricted, or suspicious. This helps security, compliance, and content teams quickly identify which content may be linked to an active threat and apply the right handling rules.

Business value: Faster containment of risky content, improved classification accuracy, and better coordination between cybersecurity and information governance teams.

2. Enriching security incident records with knowledge graph context

Data flow: OpenText Webroot Unity ? PoolParty

Webroot security alerts, threat categories, and endpoint telemetry can be sent into PoolParty to enrich incident records with semantic relationships such as affected business unit, device type, user role, location, or related content repositories. This gives analysts a more complete view of each incident and helps them prioritize response based on business impact rather than only technical severity.

Business value: Better incident triage, improved root-cause analysis, and more informed response decisions.

3. Threat-aware search and discovery across enterprise content

Data flow: PoolParty ? OpenText Webroot Unity

PoolParty can identify content topics, entities, and metadata patterns that indicate sensitive or high-value information, such as customer records, financial documents, or intellectual property. These semantic classifications can be shared with Webroot to strengthen endpoint monitoring policies and flag devices accessing or moving content that matches risky categories. This is especially useful in regulated environments where content sensitivity affects security controls.

Business value: Stronger protection for critical content, reduced exposure of sensitive information, and more targeted security enforcement.

4. Automated policy mapping for content repositories and endpoints

Data flow: Bi-directional

PoolParty can maintain a semantic model of content types, business terms, and sensitivity labels, while Webroot provides endpoint risk signals and threat intelligence. Together, they can support automated policy decisions such as tightening controls on endpoints that access classified content or escalating monitoring when a user works with documents linked to a known threat pattern. This creates a more adaptive security posture across content and device layers.

Business value: Reduced manual policy administration, more consistent enforcement, and better alignment between content governance and endpoint security.

5. Security operations knowledge base for faster analyst investigation

Data flow: OpenText Webroot Unity ? PoolParty

Webroot alerts, malware family names, phishing indicators, and remediation steps can be ingested into PoolParty as a structured knowledge base. PoolParty can then connect incidents to related threats, affected assets, and recommended actions, making it easier for security teams to search prior cases and reuse response playbooks. This is valuable for SOC teams handling repeated attack patterns.

Business value: Faster investigations, improved knowledge reuse, and more consistent incident response.

6. Content discovery for security and compliance reporting

Data flow: PoolParty ? OpenText Webroot Unity

PoolParty can classify and organize security-related documents, policies, audit evidence, and compliance records so they are easier to find and correlate with endpoint events in Webroot. For example, when a security incident occurs, teams can quickly retrieve the relevant policy documents, exception approvals, or training materials tied to the impacted system or user group.

Business value: Shorter audit preparation time, better evidence retrieval, and improved cross-functional reporting.

7. Risk-based content access workflows for business users

Data flow: Bi-directional

PoolParty can classify content by business meaning and sensitivity, while Webroot can provide endpoint trust and threat status. A workflow can be created where access to certain content is reviewed or restricted if the endpoint shows signs of compromise, unusual behavior, or elevated risk. This is useful for legal, finance, HR, and R and D teams working with confidential information.

Business value: Lower risk of data leakage, better protection of confidential workflows, and improved governance over high-value content.

8. Semantic enrichment of threat intelligence for enterprise search teams

Data flow: OpenText Webroot Unity ? PoolParty

Threat intelligence from Webroot, such as attack types, malicious domains, file hashes, and campaign names, can be semantically enriched in PoolParty and linked to internal content, tickets, and knowledge articles. This allows search and discovery teams to build more relevant internal portals for security operations, IT support, and compliance stakeholders.

Business value: Better internal knowledge access, improved collaboration across teams, and more actionable threat intelligence.

How to integrate and automate OpenText Webroot Unity with PoolParty using OneTeg?