134 Vektoren zum Thema "it compliance" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  2  3  
Compliance
Compliance testing turquoise concept icon. Software development stage idea thin line illustration. Conformance testing. App programming. System check. Vector isolated outline drawing. Editable stroke
Compliance sketch
Two hackers in masks steal personal data and banking details from a laptop, symbolizing cybercrime, online fraud, and digital identity theft.
A laptop screen displays a security shield with a keyhole and password input, symbolizing secure login, cybersecurity, and data encryption for online protection.
GDPR text inside circle of stars, bar graph, and shopping bag with tag. Ideal for data privacy, e-commerce, consumer rights, data protection, legal compliance, business operations EU regulations
Cloud with a lock, two gears, and a checklist with checkmarks. Ideal for cloud security, data protection, cybersecurity, compliance, IT maintenance system optimization and technology audits. Line
Smartphone displays shopping cart, connected to cloud with data flow, GDPR compliance shield. Ideal for e-commerce, data security, cloud storage, online shopping, privacy protection, digital
Facial scan, shield with checkmark, document checklist, cloud with servers. Ideal for cybersecurity, data protection, identity verification, secure cloud storage, IT systems compliance abstract
Outline of a cloud above a blue cloud shape and a certificate with a dollar sign and ribbon. Ideal for data security, cloud computing, online storage, digital certification, secure transactions
Blue shield with GDPR title and stars. Below are business buildings, data storage icons, and upward arrows. Ideal for data security, compliance, growth, development, privacy regulation abstract
GDPR shield symbolizes data protection, online payment screen, secure lock, and detailed document reinforce themes of privacy and security. Ideal for legal policies, online transactions, digital
Hand targeting login keys on laptop, warning screens, magnifying glass, checklist with tick, server stacks, cloud security. Ideal for online safety, data protection, threat detection security
Cloud shape with key and checklist representing access control, data security, and encryption. Ideal for cybersecurity, cloud computing, data management, audits, IT compliance, online services
Profile silhouette with exclamation triangle, globe, and shield icons representing risk and protection. Ideal for cybersecurity, data privacy, user safety, online security, IT compliance, risk
Checklist with blue checkmarks, laptop, and lock representing data protection, security, and compliance. Ideal for privacy, cybersecurity, information management, IT policies risk management secure
Laptop and padlock emphasizing online security and privacy. Ideal for cybersecurity, data protection, online safety, digital fortification, remote work security, secure communications, and IT
GDPR text surrounded by stars with icons of a person and an e-commerce checkout. Ideal for data privacy, GDPR, e-commerce, online security, IT compliance. Simple and modern style
A man sits on a laptop working on cybersecurity with a shield icon, symbolizing IT security, data protection, and online safety in a digital workspace.
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Business rule landing page template
Business rule concept vector illustration
Infrastructure as code for data center management outline icons collection set. Labeled elements with IoC streamlined processes, change management, uniformity and configuration vector illustration.
Standard operating procedure examples rectangle infographic vector. Manufacturing, administration. Data visualization with 5 steps. Editable rectangular options chart. Lato-Bold, Regular fonts used
Business finance abstract concept vector illustration set. Audit service, enterprise accounting, core banking IT system, consulting company, financial transaction, clients deposit abstract metaphor.
Corporate Business Process Chart
Project requirements isolated concept vector illustration. Business analyst creating project requirements, IT company, strategy development process, implementation engineer vector concept.
General Data Protection Regulation - GDPR concept with lock symbol and map of Europe. EU flag with stars and long shadow.
warning icon target with darts hitting on it
Server connected to a cloud icon with outward arrows, beside a checklist with blue checkmarks. Ideal for cloud storage, data management, digital transformation, IT solutions, network infrastructure
Closed padlock with keyhole and ERP-related mini-icons signifying security, data management, and system integrity. Ideal for cybersecurity, ERP systems, IT infrastructure, information safety, network
GDPR compliance shield with lock, documents, and upward arrow in blue theme. Ideal for data protection, legal services, privacy policies, cybersecurity, business compliance, IT services, and online
Laptop with a red security shield, a male and female character nearby, symbolizing cybersecurity, digital protection, and online safety for secure browsing.
Computer screen with emails, binary code, and an eye symbol, clipboard with a checklist, cloud. Ideal for data security, cloud storage, productivity tools, compliance organization privacy abstract
wireless symbol with a lock for security, GDPR text encircled by stars, and magnifying glass over the word RISK. Ideal for cybersecurity, data privacy, compliance, legal, online protection, threat
Group of three upward arrows, GDPR text encircled by stars, and a laptop. Ideal for digital growth, data privacy, security, compliance, regulation online business Information Technology. Represents
Blue shield with padlock as central focus over outlined cloud. Ideal for security, privacy, cloud storage, data protection, cybersecurity, encryption, and online safety flat simple metaphor
Large lock and magnifying glass highlight security and analysis themes. Pensive man suggests online protection, investigation, data privacy. Ideal for cybersecurity, privacy, analysis, research, IT
Cloud outline with blue certification badge and horizontal lines. Ideal for cloud storage, data security, quality assurance, certification, IT services, compliance, and digital reliability. Line
Black surveillance camera, security checkmark on document, and globe icon representing connectivity. Ideal for security systems, data protection, internet safety, global monitoring, IT
Lock on blue shield symbolizes cybersecurity with a rising line graph showing growth, and arrows indicating data exchange. Ideal for online safety, safe growth, analytics, IT strategy, trust
Eye symbol above a computer monitor and GDPR text surrounded by stars next to it. Ideal for data privacy concepts, compliance awareness, internet safety, cyber security, online regulations, data
Cloud above laptop with user examining risks through magnifying glass. Connected icons symbolize analysis, security, and data management. Ideal for risk management, cybersecurity, cloud computing
Gear for processes, person analyzing risks, GDPR compliance badge. Ideal for data privacy, security, compliance, process improvement, risk analysis, IT management abstract line flat metaphor
Cloud locked with a padlock, signed certificate with ribbon, and geared wrench. Ideal for security, cloud services, certifications, IT maintenance, tech support reliability compliance. Abstract
It services line vector icons and signs. Services, Consulting, Support, Network, Security, Integration, Outsourcing, Maintenance vector outline illustration set
Closed briefcase, hand holding keys, GDPR text symbolize data security and regulation compliance. Ideal for cybersecurity, privacy policies, legal consultation, corporate training, data management
Blue shield with GDPR in the center, surrounded by stars, black padlock, search magnifier, target. Ideal for data security, privacy regulation, compliance, online safety personal data protection
White hat hackers focus on ethical hacking, security access, and global protection. Key icons, hat, lock, globe. Outline icons set.
Large cloud hovering above three interlocking gears and a certificate. Ideal for automation, cloud computing, digital security, technology integration, IT certifications, process optimization, data

« Vorherige  1  2  3