Home | Connectors | Prodigy | Prodigy - OpenText Webroot Unity Integration and Automation
Data flow: OpenText Webroot Unity ? Prodigy
Use OpenText Webroot Unity to centrally enforce endpoint protection on the laptops and virtual desktops used by data annotators, ML engineers, and contractors working in Prodigy. This helps ensure that devices accessing sensitive training data are protected from malware, phishing, and ransomware before they connect to annotation projects.
Business value: Reduces the risk of data leakage or dataset corruption during model training initiatives, especially when annotators handle customer records, medical images, or proprietary content.
Data flow: OpenText Webroot Unity ? Prodigy
When Webroot detects a compromised endpoint, suspicious process, or active threat on a user device, the integration can automatically trigger a workflow to suspend that user?s access to Prodigy projects until the device is remediated. This can be implemented through identity or access management controls linked to security alerts.
Business value: Prevents compromised endpoints from being used to access or alter training data, protecting model integrity and reducing incident response time.
Data flow: OpenText Webroot Unity ? Prodigy
Before raw files are pulled from shared drives, endpoint folders, or synced repositories into Prodigy for labeling, Webroot can scan and validate the source devices and files for malware or suspicious behavior. Only trusted, clean data sources are allowed into the annotation workflow.
Business value: Lowers the chance that infected files enter the AI training pipeline, which can disrupt annotation work and contaminate downstream model training environments.
Data flow: Bi-directional
Prodigy can identify projects containing regulated or highly sensitive content, such as healthcare images, legal documents, or customer communications, and send project metadata to security operations. OpenText Webroot Unity can then apply stricter endpoint policies for users assigned to those projects, such as enhanced monitoring or tighter device compliance checks.
Business value: Supports governance for sensitive AI initiatives by aligning dataset handling requirements with endpoint security controls across data science and security teams.
Data flow: Prodigy ? OpenText Webroot Unity
Prodigy audit logs can be shared with security teams when investigating suspicious activity, such as unusual labeling patterns, unexpected dataset exports, or access from a flagged device. Webroot analysts can correlate endpoint threat data with Prodigy user activity to determine whether a security event impacted annotation work.
Business value: Improves forensic investigation speed and helps distinguish between legitimate annotation activity and potential insider risk or compromised account behavior.
Data flow: OpenText Webroot Unity ? Prodigy
For organizations that use external labeling vendors or temporary annotators, Webroot can enforce baseline endpoint security requirements before users are granted access to Prodigy. This can include checking for active protection, patch status, and device health before enabling project participation.
Business value: Makes it easier to scale annotation capacity without weakening security posture, especially in distributed or outsourced labeling operations.
Data flow: Prodigy ? OpenText Webroot Unity
When a labeled dataset is finalized in Prodigy and handed off to downstream ML training or MLOps workflows, dataset metadata can be shared with security operations for tracking and policy enforcement. This is useful for identifying which endpoints, users, or teams handled the source data during the labeling cycle.
Business value: Creates better traceability across the AI development lifecycle and supports compliance reviews, especially where training data provenance matters.
Data flow: OpenText Webroot Unity ? Prodigy
Webroot threat intelligence can be used to flag users, locations, or devices operating in higher risk conditions, allowing Prodigy administrators to route those users to lower sensitivity projects or restrict access to premium datasets. This can be applied dynamically based on security posture or threat level.
Business value: Helps organizations maintain productivity while reducing exposure to sensitive data in environments with elevated cyber risk.