62 Vektoren zum Thema "software integrity" bei ClipDealer

Medien sortieren nach     Gehe zu Seite:    
« Vorherige  1  2  
Code brackets in blue with a shield padlock symbolizing secured coding practices, cybersecurity and data protection. Ideal for software development, secure coding, web security, data protection
Information Security icon set. Antivirus Software, Firewall, Encryption, Monitoring, Cryptography, Integrity, Risks, Data. Duotone color solid icons
Data integrity
Enterprise Resource Planning
Electronic equipment. Update, modernization. Vector icon on a white background.
Honesty icon. Thin line design symbol from business ethics icons collection. Pixel perfect honesty icon for web design, apps, software, print usage
Set of Technology icons, such as Smartphone buying, Loyalty points, Integrity. Vector
Data encryption  icon
Cogwheel and check mark, integration concept, technology solution, system compliance, business automation, software development
Security, data integrity, protection, security deposits, payments, guarantee integrity information.
Confidentiality, Integrity and Availability - CIA
Security, data integrity, deposits, guarantee
Csr icon. Flat creative element from business ethics icons collection. Colored csr icon for templates, web design and software
Big Data Well-crafted Pixel Perfect Vector Thin Line Icons 30 2x Grid for Web Graphics and Apps
Morality icon. Monochrome style design from business ethics icon collection. UI and UX. Pixel perfect morality icon. For web design, apps, software, print usage.
Flat illustration of two people configuring secure cloud storage to ensure data integrity and prevent unauthorized access to online files
Set of Technology icons, such as Smartphone buying, Loyalty points. Certificate, approved group, save planet. Integrity, Methodology, Talk bubble. Seo analysis, Typewriter, Call center. Vector
Closed padlock with keyhole and ERP-related mini-icons signifying security, data management, and system integrity. Ideal for cybersecurity, ERP systems, IT infrastructure, information safety, network
A simple line drawing of a USB drive with a shield and check mar
Digital Threat Detection and Malware Prevention with Biohazard Alert, Phishing Email, and Infected Server Protection
File Access Rights cloud storage Downloading
Face scan with shield and check mark, gear symbol, person pointing. Ideal for technology, security, identity verification, data protection, user interaction privacy digital. Abstract line flat
Security refers to measures taken to protect individuals, assets, and information from harm, theft, or unauthorized access. It encompasses physical, cyber, and network protections to ensure safety and privacy.
Rescan is the process of scanning again to update or refresh data, typically used in contexts such as technology, devices, and systems to retrieve the latest information or configurations.
A file lock prevents multiple users or processes from modifying a file simultaneously, ensuring data integrity and avoiding conflicts or corruption by restricting access during updates.
Hand using blue watering can to water a locked password box icon with droplets. Ideal for cybersecurity, password management, data protection, digital growth, nurturing security, safe internet
Digital Threat Detection and Malware Prevention with Biohazard Alert, Phishing Email, and Infected Server Protection Darker Background Version with Editable Stroke and Colors.
Black silhouette of a closed padlock near a laptop. Ideal for cybersecurity, data encryption, online privacy, secure communication, information protection, digital safety, network security. Modern
A simple line drawing of a computer monitor with a padlock symbo
This image depicts a stack of servers with a shield icon featuri
Six 3D cubes connected by dotted lines representing blockchain, decentralization, and data sharing. Ideal for technology, innovation, connectivity, network, data security, digital systems
A graphic representation of cybersecurity, featuring a shield wi
Privacy icon set. Password, Information, Gender, Bodily Integrity, Personal Data, Permission, Security, Policy. Duotone color solid icons
A shield design features a padlock, representing the concept of security and protection in a digital context.
A file lock is a mechanism that restricts access to a file, ensuring that only one user or process can modify it at a time, preventing conflicts and data corruption.
Shopping cart, checklist with marked items, and facial recognition symbolizing e-commerce, digital identity, and task management. Ideal for online shopping, authentication, automation, customer
fraud detection black line icon.
Application security focuses on protecting data with a central lock, gears, and email symbol. Dark theme outline style illustration.
The image depicts a USB drive with a shield symbol, representing
The image depicts a laptop with a shield icon, symbolizing cyber
File file management editing organizing
QR code beside clipboard and check mark signifying secure transactions, digital verification, and authentication. Ideal for technology, data security, efficiency, business, innovation, customer
Data analytics and analysis icon of magnifier and cogwheel for IT web statistics, line vector. Website data analysis icon for SEO optimization and search engine or webpage performance in programming
Chain Link Flat Vector Icon
Integrity circle infographic template. Sensitive data security. Data visualization with 5 steps. Process timeline info chart. Workflow layout with line icons. Lato-Bold, Regular fonts used
Detailed financial calculation and analysis data concept isometric illustration
Endpoint security focuses on protecting devices from threats. Key objects, lock, laptop, shield. Dark theme outline style illustration.
Cybersecurity involves protecting systems, networks, and data from cyber threats, ensuring confidentiality, integrity, and availability. It encompasses threat detection, prevention, and response strategies to safeguard digital assets from unauthorize
Network security focuses on protecting data with firewalls, encryption, and secure access. Dark theme outline style illustration.
Set of icons including facial recognition, a blue shield with check mark, cherry fruit, and a discount coupon. Ideal for technology, security, shopping deals, online identity, cybersecurity nature

« Vorherige  1  2