Search keywords: sanctions
Nalezeno obrázků: 2
Obrázků na stránce:
Obrázky z Adobe Stock
Collection of approved and accepted ribbon and circular stamps
Identity verification web icons in line style. Biometric authentication, passport, fingerprint, face scanner, privacy shield, login access. Editable stroke. Vector illustration.
Database security icons collection with shield and lock symbols.
Collection of 3D rendered black security icons with gold lock symbols.
Security Icons Representing Data Protection Laws.
Identity Security protecting digital identities through multi-factor authentication, access control, encryption, and privacy measures
Collection of cybersecurity and data protection icons.
Purchase Order icon set multiple style collection
Authentication outline icon set. Identity icon set. Containing ID card, biometric, fingerprint, identification, passport, DNA, and authentication icons. Editable stroke outline icon.
Shield with Keyhole Icon: Security, Protection, Access Control, Safety
Authentication Icon Set Multiple Style Collection
Authentication line icons. Cybersecurity identity protection. Biometric 2FA face id fingerprint. Digital access control. Login password reset. User verification. Smart lock privacy.
Secure Digital Payment Authorization Process with Wallet PIN and Financial Transaction Verification Steps
Conceptual diagram illustrating data flow and security protocols.
Licensing Authority Icon Sheet Glyph Color
Cybersecurity Shield Illustration Emphasizing Digital Security, Protection, and Safe Online Technology Systems.
Security Protection and Privacy Icons Set with Warning Alert and Access Control Symbols
Account Settings. icons with various styles and colors
Courtroom bankruptcy system banner highlighting judicial procedures and professional legal representation in Lineal Icon Style
Process Approval icon sheet multiple style collection
Cloud Computing Security and User Access Management Diagram.
Password related icon collections. Containing Password, Security, Lock, Key, Authentication, Privacy, Protection, Access, Encryption, and Safety icons. Editable Stroke.
Secure Data Flow from Users to Server with Protection.
Check mark icon, green confirmation symbol, approval tick sign in various shapes
Compliance line icon set. Including Audit, Policy, Regulation, Shield, Checklist, Law, Document, Security, Standard, Certificate. Line art vector illustration
Identity Security protecting digital identities through multi-factor authentication, access control, encryption, and privacy measures
Collection of business security icons.
Cyber security icons collection showcasing various elements like shield, network, and encryption in a grid layout
Authentication outline icon set. Identity icon set. Containing ID card, biometric, fingerprint, identification, passport, DNA and authentication icons.
A distressed red stamp displays the words authorization confirmed in bold capital letters signifying official approval high quality professional detailed modern
Security System blue style Icon Set Collection Editable Concept With Icon Of threat detection, biometric, safe, intrusion, password, access control, and more. Illustration eps 10
Colorful hand-drawn icon set illustrating biometric security and access control for heavy machinery operators, featuring face recognition, fingerprint scans, and authorization badges
Approval Stamp: A close-up shot of an approved stamp, conveying a clear message of authorization and validation, perfect for any project requiring verification.
Approved Stamp: A bold stamp declares APPROVED, symbolizing authorization and validation, set against a clean, uncluttered field.
Cloud Computing Security Icons: Locked Cloud in Line Art and Silhouette
Security monitoring, intrusion alert, and permission check icons representing business security and access control concepts.
trust management icon set with multi concept
Artificial intelligence, digital certification, renewable energy, technology innovation, smart systems, future concepts. Chip, certificate with ribbon and battery icon. Artificial intelligence
Insolvency legal process banner presenting formal bankruptcy procedures and regulated court based financial restructuring in Lineal Icon Style
Process Approval icon sheet multiple style collection
Approved Official Seal: A vintage-style seal displays the words APPROVED and OFFICIAL, conveying a sense of authorization and legitimacy. This circular emblem represents a stamp of approval.
Blank identity card template with a placeholder for a portrait, text lines, and a blue border representing a driver's license or employee ID.
Security password 2fa code authentication technology icon vector set modern graphic illustration design, web site mobile account login safety, user identity otp verification shield, website privacy
Conceptual diagram illustrating security and user protection measures.
Minimal Line Art Illustration of User Profile Search and Verification Process. Secure Identity Validation Minimalist Icon for Account Approval Concept.
Access Management system controlling user permissions with authentication, identity verification, and secure network access
Grungy red rubber stamp illustration with Signature Pending text, signifying a document awaiting authorization or final approval process
id card badge icon vector outline silhouette and solid glyph set
Colorful padlock icons with question marks
A collection of security and law icons on a white background
Conceptual illustration of data privacy and security protocols.
Two user profile icons with checkmark badges indicating verification or approval
Approved document verification icon – checklist approval, validated file and confirmed report line icon set
Account Settings. icons with various styles and colors
Digital Lock Security Protection Concept.
Authentication outline editable Icon Set Collection Concept With Icon Of verification, digital certificate, security, token, security, support, user profile, and more. Illustration eps 10
A web interface displaying Secured Credentials is surrounded by multiple digital security shields and open and closed padlocks.
Comprehensive Collection of Modern Icons for Digital Security, Identity Protection, and Data Privacy Management Systems
Digital forensics theme focused on investigative processes and legal compliance in cybersecurity incidents. in Lineal Icon Style
Process Approval icon sheet multiple style collection
Approval Stamp: A close-up shot of an APPROVED stamp, conveying a clear message of authorization and validation. The image is ideal for projects requiring the concept of approval or authentication.
Cyber security line icons set for data protection, network safety, privacy control, encryption, authentication, access management, digital technology illustration
Flat Colored Lock Unlock Login Logout Icon Set for Security Interface
Key icon representing security and access simple design.
A collection of security and protection icons in a flat minimal design style
Identity Security protecting digital identities through multi-factor authentication, access control, encryption, and privacy measures
Digital security concept shown through a rectangular grungy stamp indicating successful server access or authorization clearance
Cybersecurity process flow with security barriers and protected data.
Car Driver Permit Identification Card Template
Permit Single Icon Pack Multistyle
Approval Stamp: A bold stamp declares APPROVED, representing official endorsement and confirmation. It's a clear symbol of authorization and validation.
AI承認 チェックマーク 脳チップアイコン
3d shield under magnifying glass with padlock inside the lens. Security audit, cybersecurity analysis, access control verification, risk assessment concept.
Account Settings. icons with various styles and colors
Cyber Security Icons: Data Protection, Firewall, Biometrics, Cloud
Authentication color style editable Icon Set Collection Concept With Icon Of verification, digital certificate, security, token, security, support, user profile, and more. Illustration eps 10
Security Icons Shield Collection Check Mark Padlock Fingerprint Eye Chip Grid Lightning Bolt
Two shield icons one solid black and one white outline both with checkmarks
AI security banner focused on resilient system protection and ethical compliance strategies. in Lineal Icon Style
Process Approval Icon In Black And White Filled Style.
Approval Stamp: A bold, blue APPROVED stamp signifies validation and endorsement, ideal for conveying official consent and authorization in various contexts.
Identity verification and security icons with fingerprint and face recognition vector illustration
Outline privacy policy icon set showing data protection, security, consent, and compliance concepts with editable stroke icons for modern interfaces.
Graffiti fingerprint logo vector design
Mix icon for informed consent
Access Management system controlling user permissions with authentication, identity verification, and secure network access
Personal account user data online banking smartphone app isometric vector illustration. Mobile interface access authentication password information storage verification authorization technology
Cloud Security and Access Management Concepts: IAM Roles, Permissions, and VPC Integration Line Icons for Digital Protection and Network Control.
Zero Trust Network Security Architecture Diagram Explained.
Barrier arm at entrance with red and white stripes controlling access to restricted area, viewed from outside
Purchase Approval icon set multiple style collection
Collection of Hand Drawn Padlocks and Keys.
authorization consent page concept illustration flat design vector. simple modern graphic element for landing page ui, infographic, icon
Account Settings. icons with various styles and colors
Finger Scan in Futuristic Style. Biometric id with Futuristic HUD Interface. Fingerprint Scanning Technology Concept Illustration. Identification System Scanning.
roter Stempel Sanktionen
A set of four black and white VIP badges with different designs and shapes on lanyards
CONSENT typography on blue square with icons and keywords
Cyber security banner presenting encrypted infrastructure and responsible digital protection strategy. in Lineal Icon Style
Cloud Computing Network Security and Data Protection Diagram.
Next page
/ 10