Home
OneSpan
Trust Center
Forum
Login
English
English
French
Ask Ozzy
Contents
x
Welcome to our new Documentation Portal!
Authentication Server
Authentication Server Appliance
Authentication Suite Server SDK
FIDO Hardware Authenticators
FIDO Universal Server SDK
Intelligent Adaptive Authentication
Mobile Application Shielding
Mobile Authenticator Enterprise Security
Mobile Authenticator Studio
Mobile Security Suite
OneSpan Cloud Authentication
OneSpan Identity Verification
OneSpan Threat View
OneSpan Sign
OneSpan Threat Protection
Global Solution Demos
Administrator Guide
5 Articles
in this category
Share this
Print
Share
Dark
Light
Contents
Administrator Guide
5 Articles
in this category
Share
Dark
Light
Introduction
OneSpan Threat View is a cutting-edge software solution designed to provide insights into the interaction of users and their devices with(in) mobile applications and to have visibility into mobile threats faced by the users. The solution integrates ...
Updated on : 27 Jun 2025
Threat exposure monitoring: conceptual overview
To monitor your threat exposure, Threat View captures endpoint device information with its client-side engines from mobile devices. The client-side engines communicate this information to a server-side component, and the collected information is the...
Updated on : 27 Jun 2025
User management
OneSpan Threat View enables you to configure your own user accounts and offers different types of user accounts. Types of user accounts and permissions: Threat View user roles Threat View organizes the user accounts in three different roles: ...
Updated on : 27 Jun 2025
Monitored data
OneSpan Threat View monitors the following types of data to analyze the collected threat types and events: Device data Geolocation data App data For information about data collection and GDPR compliance, see GDPR Compliance . Monitor...
Updated on : 27 Jun 2025
Visualization of monitored data
OneSpan Threat View uses data on threat event types received from your App Shielding integration and visualizes this data in different charts collected in widgets. Threat View displays these widgets on the dashboard and in threat event reports. ...
Updated on : 27 Jun 2025
Event Simulator
The Threat View product package also includes the Event Simulator, a service that generates test events at regular interval to provide realistic data. This can be used to quickly evaluate Threat View in a demo environment, and allows to install Thre...
Updated on : 27 Jun 2025
Auditing
OneSpan Threat View provides the possibility to audit the system via the audit logger Docker image, onespan_threat-view_auditlogger_ version .tar . With the auditing system, all Threat View microservices can be audited, allowing you to audit the sy...
Updated on : 27 Jun 2025
Change password!
Changing your password will log you out immediately. Use the new password to log back in.
Current password
Current password is required
New password
New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password
Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password should be same as new password
Update
Change profile
Success!
First Name
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last Name
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
New email
Enter a valid email
Re-enter your password
Enter a valid password
Your profile has been successfully updated.
Update
Logout
ENTER
ESC
Ozzy, our interactive help assistant
Search Limit Exceeded. Please upgrade the plan.
Answer copied!
No results found
Provide more context or information so that I can better understand and assist you