Home | Connectors | Prodigy | Prodigy - OpenText Webroot Unity Integration and Automation

Prodigy - OpenText Webroot Unity Integration and Automation

Integrate Prodigy Artificial intelligence (AI) and OpenText Webroot Unity Security / Identity Access Management apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between Prodigy and OpenText Webroot Unity

1. Secure labeling workstation protection for AI annotation teams

Data flow: OpenText Webroot Unity ? Prodigy

Use OpenText Webroot Unity to centrally enforce endpoint protection on the laptops and virtual desktops used by data annotators, ML engineers, and contractors working in Prodigy. This helps ensure that devices accessing sensitive training data are protected from malware, phishing, and ransomware before they connect to annotation projects.

Business value: Reduces the risk of data leakage or dataset corruption during model training initiatives, especially when annotators handle customer records, medical images, or proprietary content.

2. Security event driven suspension of annotation access

Data flow: OpenText Webroot Unity ? Prodigy

When Webroot detects a compromised endpoint, suspicious process, or active threat on a user device, the integration can automatically trigger a workflow to suspend that user?s access to Prodigy projects until the device is remediated. This can be implemented through identity or access management controls linked to security alerts.

Business value: Prevents compromised endpoints from being used to access or alter training data, protecting model integrity and reducing incident response time.

3. Protected ingestion of raw data into annotation pipelines

Data flow: OpenText Webroot Unity ? Prodigy

Before raw files are pulled from shared drives, endpoint folders, or synced repositories into Prodigy for labeling, Webroot can scan and validate the source devices and files for malware or suspicious behavior. Only trusted, clean data sources are allowed into the annotation workflow.

Business value: Lowers the chance that infected files enter the AI training pipeline, which can disrupt annotation work and contaminate downstream model training environments.

4. Annotation project governance for regulated data

Data flow: Bi-directional

Prodigy can identify projects containing regulated or highly sensitive content, such as healthcare images, legal documents, or customer communications, and send project metadata to security operations. OpenText Webroot Unity can then apply stricter endpoint policies for users assigned to those projects, such as enhanced monitoring or tighter device compliance checks.

Business value: Supports governance for sensitive AI initiatives by aligning dataset handling requirements with endpoint security controls across data science and security teams.

5. Incident response support using annotation audit trails

Data flow: Prodigy ? OpenText Webroot Unity

Prodigy audit logs can be shared with security teams when investigating suspicious activity, such as unusual labeling patterns, unexpected dataset exports, or access from a flagged device. Webroot analysts can correlate endpoint threat data with Prodigy user activity to determine whether a security event impacted annotation work.

Business value: Improves forensic investigation speed and helps distinguish between legitimate annotation activity and potential insider risk or compromised account behavior.

6. Controlled contractor onboarding for external annotators

Data flow: OpenText Webroot Unity ? Prodigy

For organizations that use external labeling vendors or temporary annotators, Webroot can enforce baseline endpoint security requirements before users are granted access to Prodigy. This can include checking for active protection, patch status, and device health before enabling project participation.

Business value: Makes it easier to scale annotation capacity without weakening security posture, especially in distributed or outsourced labeling operations.

7. Security aware MLOps handoff for model training datasets

Data flow: Prodigy ? OpenText Webroot Unity

When a labeled dataset is finalized in Prodigy and handed off to downstream ML training or MLOps workflows, dataset metadata can be shared with security operations for tracking and policy enforcement. This is useful for identifying which endpoints, users, or teams handled the source data during the labeling cycle.

Business value: Creates better traceability across the AI development lifecycle and supports compliance reviews, especially where training data provenance matters.

8. Threat intelligence informed prioritization of high risk annotation environments

Data flow: OpenText Webroot Unity ? Prodigy

Webroot threat intelligence can be used to flag users, locations, or devices operating in higher risk conditions, allowing Prodigy administrators to route those users to lower sensitivity projects or restrict access to premium datasets. This can be applied dynamically based on security posture or threat level.

Business value: Helps organizations maintain productivity while reducing exposure to sensitive data in environments with elevated cyber risk.

How to integrate and automate Prodigy with OpenText Webroot Unity using OneTeg?