Home | Connectors | OpenText Webroot Unity | OpenText Webroot Unity - Ziflow Integration and Automation
OpenText Webroot Unity and Ziflow serve very different but complementary business needs. Webroot Unity protects endpoints, users, and corporate data from malware, phishing, and ransomware, while Ziflow manages creative review, proofing, and approval workflows. Integrating them helps security teams and creative teams work more safely and efficiently, especially where content collaboration, external reviewers, and distributed workforces are involved.
Data flow: OpenText Webroot Unity to Ziflow
When creative assets are uploaded into Ziflow for review, Webroot Unity can scan the originating endpoint or file source for malware before the file is shared with reviewers. This reduces the risk of infected assets entering the approval workflow and protects internal teams, agencies, and external stakeholders from malicious files.
Data flow: OpenText Webroot Unity to Ziflow
Security posture from Webroot Unity can be used to identify whether a reviewer?s device is protected, outdated, or at elevated risk. Ziflow can then restrict access, require additional approval, or route the proof to an alternate reviewer if the endpoint does not meet security standards. This is especially useful for regulated industries and sensitive campaigns.
Data flow: OpenText Webroot Unity to Ziflow
If Webroot Unity detects phishing activity, credential theft, or suspicious behavior on a user endpoint, Ziflow can automatically suspend proofing notifications, approval actions, or content sharing for that user until the security team clears the device. This prevents attackers from using compromised accounts to approve or distribute sensitive creative materials.
Data flow: Bi-directional
Creative teams often invite external agencies, copywriters, and production partners into Ziflow. By integrating with Webroot Unity, organizations can apply security checks to internal endpoints and use risk signals to determine whether external collaboration should proceed. Ziflow can also notify security teams when external users are added to proofs involving sensitive content.
Data flow: Ziflow to OpenText Webroot Unity
When Ziflow identifies proofs containing regulated, confidential, or pre-release content, it can send metadata to Webroot Unity or a connected security workflow to apply stricter endpoint controls for users accessing those assets. For example, users reviewing launch materials may be required to use fully protected devices with active threat monitoring.
Data flow: OpenText Webroot Unity to Ziflow
When Webroot Unity detects ransomware, malware, or suspicious activity on a device used by a designer, marketer, or approver, Ziflow can notify proof owners and project managers to pause active reviews, revoke access, or reassign tasks. This keeps creative deadlines moving while limiting the spread of risk across the workflow.
Data flow: Bi-directional
Combining Ziflow approval history with Webroot Unity security events creates a stronger audit trail for sensitive content operations. Organizations can show who reviewed or approved a proof, from which device, and whether that device was protected at the time. This is valuable for compliance, legal review, and internal investigations.
Together, OpenText Webroot Unity and Ziflow can create a more secure and controlled creative collaboration environment, reducing risk while keeping review cycles efficient and auditable.