SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Top Argentine credit card provider leverages IntSights for external brand protection

Top Argentine credit card provider leverages IntSights for external brand protection
Contact company
Contact IntSights
icon Add as a preferred source Download PDF version
Related Links
  • Strengthening the physical and cyber barriers around critical infrastructure
  • IntSights Threat Command available through the ALSO cloud marketplace
  • Cutting through the hype: AI and ML for the security space
  • How schools can make outdoor learning safe and secure

Naranja is Argentina’s largest issuer of credit cards. With over 5 million clients and 210 storefront locations across the country, the company has a substantial presence in nearly every city.

Headquartered in Cordoba, Argentina’s second-largest city, Naranja has over 4 million cardholders and 9 million active cards that perform 146 million transactions per year. While its primary operations are in Argentina, Naranja also has a strong presence in Peru and the Dominican Republic via its business partnerships.

Naranja recently entered the fintech sector through Naranja X, a mobile app that satisfies customers’ daily needs with digital products and services for people, merchants, and small businesses.

Security Operations Centre

The company has a workforce of around 3,000, with a security team made up of 30 people. There are three pillars within the security team: digital information security, which covers products and standard security revisions; cybersecurity, which includes the Security Operations Centre (SOC) and several tools for SIEM and endpoint protection; and security information, which pertains to digital brand protection strategy.

The SOC team primarily uses IntSights Threat Command for brand protection initiatives. Daniel Daniele, the Information Security Lead, and Leonardo Ariel Chiodin, an Information Security Analyst, use the IntSights platform daily as part of their brand protection activities.

Lack of determining threat

SOC team used online tools to manually check for mentions of Naranja, but these tools were not capable of alerting the team

Before adopting IntSights, Daniele’s team was faced with performing manual threat hunting and monitoring of domains, social media platforms, and other sources where Naranja digital assets could be exposed or at risk. Naranja’s security team lacked visibility into external threats to the company’s online brand, such as malicious spoofed domains or leaked credentials.

The SOC team used several online tools to manually check for mentions of Naranja, but these tools only provided surface-level information and were not capable of alerting the team when targeted threats emerged.

If the team did not manually check the sites they knew of frequently, it would leave the company susceptible to cyberattacks. The limited visibility into external threats and the security team’s reactive strategy meant that Naranja needed to rely on the existing perimeter and endpoint security solutions in the event of an attack.

IntSights Threat Command

Naranja’s SOC team knew they needed to embrace a more proactive strategy to identify external cyber threats. They looked into several different vendors in the cyber threat intelligence space, measuring each solution’s capabilities against the company’s most pressing needs.

Naranja team determined that IntSights Threat Command provided the best threat data to provide broad visibility

After careful consideration, the Naranja team determined that IntSights Threat Command provided the best threat data compared to other vendors. The quality, breadth, and accuracy of the threat alert IntSights provided were superior to that of the other vendors.

The Naranja SOC team decided it was the best fit to provide broad visibility into external threats targeting the organisation, offering the automated ability to constantly monitor for threats.

Efficient threat detection with ETP 

Since Naranja deployed IntSights, Daniele and Chiodin have gained visibility, become more efficient, and been able to focus more on threat investigation, rather than manually searching for and identifying threats.

The SOC team has visibility into threats targeting Naranja’s digital assets and personnel, whether it be stolen credit card numbers, spoofed domains, or targeted corporate executives and VIPs. They receive automated daily alerts regarding external cyber threats directly within the IntSights External Threat Protection (ETP) platform.

Naranja’s SOC team can focus on the most important or pressing threats against the brand, as Threat Command identifies critical and actionable threats. The platform’s detailed threat data provides critical information that enables the security team to prevent credential or credit card leaks. With IntSights in-platform remediation tools, Daniele and Chiodin can mitigate the risk of threats before they evolve into cyberattacks by proactively shutting them down at the source.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Digital video surveillance
  • Remote video surveillance
  • Industrial security
  • Remote security
  • Commercial security
  • Perimeter security
  • Security management
  • Security cameras
  • Security camera systems
  • Security monitoring system
  • Network monitoring
  • Remote video monitoring
  • Intrusion detection
  • Identity management
  • Institute security
  • Industrial security systems
  • Security software
  • Security service
  • Integration software
  • Perimeter protection
  • Cyber security
  • Corporate Security
  • Central Monitoring
  • Data Security
  • Incident Management
  • Cloud security
  • Related categories
  • CCTV software
  • Access control software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Industrial & Commercial
About this page

"Naranja employs IntSights solution for external brand protection" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from IntSights.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec