Laptop with shield, magnifying glass, notifications, checklist, analysis elements for security. Ideal for data protection, online safety, risk management, analysis secure browsing tech simple flat
Information security analyst icons outline key concepts like surveillance, access control, and data protection. Outline icons set
Compliance training cycle illustrates the process of defining standards, educating, implementing, monitoring, and improving. Key objects, shield, cycle arrows, icons. Outline diagram
HACCP food safety preventive analysis and control system, outline diagram. Bacteria hazard monitoring and critical hygiene requirement points for safe food production process and preparation.
Compliance management concept. List of rules. Clipboard with tasks. Organizing efficient work processes and business ethics. Reviewing the list of business rules. Flat vector illustration.
Outline icons set representing quality assurance concepts, approval, inspection, protection, verification, and continuous improvement, outline icons set.
Dealership system management infographic circles flowchart. Vehicle title, inventory control. Visualization diagram with 4 steps. Circular info graphic editable. Montserrat SemiBold font used
A digital security concept with emails, binary code, and an eye, representing surveillance, data protection, privacy, and network security. Useful for tech, cybersecurity, and privacy awareness.
Female scientist with clipboard standing near microscope and HACCP document, surrounded by vegetables, on white background. Concept of food safety. Vector illustration
Device enrollment multi color concept icon. Endpoint security, access control. Profile data. Round shape line illustration. Abstract idea. Graphic design. Easy to use in infographic, presentation
Cybersecurity line icons, signs set. Collection of Cybersecurity, Network, Security, Attack, Prevention, Monitor, Vulnerability, Malware, Firewall outline vector illustrations.
Fire inspector holding clipboard beside fire extinguisher and checklist, with gears and shield icons in background. Concept of fire safety and inspection. Vector illustration
Scrutiny document plan icon in flat style. Review statement vector illustration with long shadow. Document with magnifier loupe business concept.
Magnifying glass like check assess. scrutiny plan, verify service critique process and annual examination concept. flat style logotype graphic design quality sign or success proven on white background
Audit with magnifying glass linear icon. concept of overview, inspection business, tax calculation or analyzing finance report, accounting advice, examination. linear sign isolated on white background
Audit document icon in flat style. Result report vector illustration on white isolated background. Verification control business concept.
Scrutiny document plan icon in flat style. Review statement vector illustration on white isolated background. Document with magnifier loupe business concept.
Scrutiny document plan icon in flat style. Review statement vector illustration on white isolated background. Document with magnifier loupe business concept
Scrutiny document plan icon in comic style. Review statement vector cartoon illustration pictogram. Document with magnifier loupe business concept splash effect.
Verification icon. Black filled vector illustration. Verification symbol on white background. Can be used in web and mobile.
Scrutiny document plan icon in flat style. Review statement vector illustration on white isolated background. Document with magnifier loupe business concept.
Audit document icon in flat style. Result report vector illustration on isolated background. Verification control business concept.
Audit document icon in flat style. Result report vector illustration on isolated background. Verification control business concept.
Audit document icon in flat style. Result report vector illustration on white isolated background. Verification control business concept.
Business scrutiny assess with glass. concept of plan, success proven, verify service, critique process and investment risk. flat logotype annual quiz examination graphic art design on white background
Scrutiny document plan icon set in flat style. Review statement vector illustration on white isolated background. Document with magnifier loupe business concept
Scrutiny document plan icon in comic style. Review statement vector cartoon illustration pictogram. Document with magnifier loupe business concept splash effect.
Audit document icon in comic style. Result report vector cartoon illustration on white isolated background. Verification control business concept splash effect.
Scrutiny document plan icon in comic style. Review statement vector cartoon illustration pictogram. Document with magnifier loupe business concept splash effect.
Audit document icon in flat style. Result report vector illustration on isolated background. Verification control business concept.
Audit document icon in comic style. Result report vector cartoon illustration on white isolated background. Verification control business concept splash effect.
Scrutiny document plan icon in flat style. Review statement vector illustration with long shadow. Document with magnifier loupe business concept.
Cybersecurity involves protecting systems, networks, and data from digital threats like hacking, malware, and unauthorized access, ensuring confidentiality, integrity, and availability of information across platforms and devices.
Eye check mark icon . Success monitoring illustration. Parental control logo. Good super vision symbol. Scan Surveillance Sign. Vector illustration isolated on white
Scrutiny document plan icon in flat style. Review statement vector illustration on white background. Document with magnifier loupe business concept.
Infrastructure as code for data center management outline icons collection set. Labeled elements with IoC streamlined processes, change management, uniformity and configuration vector illustration.
CCO, Chief Compliance Officer. Concept with people, letters and icons. Colored flat vector illustration. Isolated on white background.
HACCP Food safety steps for meeting quality standards outline diagram. Bacteria hazard control and hygiene requirements for safe food preparation. Cleanliness, separating food, safe cooking and chill.
Incident response - organized approach to addressing and managing the aftermath of a security breach or cyberattack, text concept background
AI-Optimized Regulatory Compliance abstract concept vector illustration. Government and Public Services. Ensure regulatory compliance with AI-based monitoring and reporting. abstract metaphor.
Line icons about risk management. Contains such icons as operational, reputacional, legal, compliance and financial risk. Editable stroke. Vector 64x64 pixel perfect.
Clipboard with checklist, blue padlock, and brown labels symbolizing data security, privacy, organization. Ideal for compliance, data protection, information security, task management privacy
A quality control inspector holds magnifying glass and gear while smiling, wearing gloves, representing inspection and assurance in manufacturing environment
Document with marked checklist, online chat window, and lock icon. Ideal for task management, cybersecurity, team collaboration, workflow organization, user privacy, productivity simple landing page
Laptop with GDPR shield, locked folder, digital keys, cloud security, biometric verification, document signing. Ideal for data protection, online privacy, cybersecurity compliance encryption cloud
Binary code, a watchful eye, envelopes signifying emails, and a balancing scale. Ideal for data privacy, surveillance, digital ethics, information balance, cyber law email security cybersecurity
Security camera connected to the cloud for data transfer. Includes document with signature symbol. Ideal for video monitoring, data storage, cybersecurity, remote access, contract security
Wall clock displaying time paired with a CCTV camera emitting signals. Ideal for surveillance, time management, productivity, security systems, workplace monitoring, punctuality, simple flat metaphor
Surveillance camera monitoring traffic, with speedometer and traffic light for safety. Ideal for traffic safety, road monitoring, surveillance, urban management, technology, automation, simple flat
Wrench symbolizing tools and adjustments, surrounded by stars and GDPR text. A man inspects with a magnifying glass. Ideal for data protection, privacy, regulation, security, compliance, EU policies
ERP system with interconnected icons of analytics, finance, team, tools, and GDPR protection visualized as a shield. Ideal for business process, compliance, security, data management automation
Fingerprint, checkmark, eye surveillance, and secure lock symbolize security, identity, and privacy. Ideal for cybersecurity, data protection, authentication user access biometrics surveillance
Mounted security camera scanning surroundings with access card system. Ideal for surveillance, safety, monitoring, technology, data privacy, security systems, safety compliance. Simple flat metaphor
Camera scanning documents with text, symbolizing data monitoring, privacy, or security policies. Ideal for cyber security, privacy, compliance, monitoring, technology data management simple flat
Checklist with completed items, pie chart, surveillance camera, and cloud element. Ideal for security, monitoring, compliance, data analysis privacy cloud technology risk management. Simple flat
Signed contract with digital highlighting, laptop displaying online security, wall clock symbolizing time. Ideal for digital agreements, time tracking, security, online services, deadlines, legal
Factory buildings with chimneys paired with data visualization dashboard and checklist interface. Ideal for industry, management, analytics, process monitoring, compliance, manufacturing, corporate
Checklist with completed tasks beside blue shield featuring fingerprint pattern. Ideal for cybersecurity, privacy, protection, verification, compliance, safety, IT processes, simple flat metaphor
Large eye with rays, padlock, and thumbs-up sign reflecting trust, privacy, surveillance, and security concepts. Ideal for data security, privacy control, trust compliance approval safety
Document with checklist, magnifying glass with eye icon, and speech bubble representing analysis, approval, teamwork, communication, quality assurance, auditing and workflow. Simple flat metaphor
Bold caution sign featuring a security camera icon on a bright yellow background framed by black stripes. Ideal for safety awareness and surveillance communication.
Test planning blue gradient concept icon. Data management, servers. Task list, strategy. Round shape line illustration. Abstract idea. Graphic design. Easy to use in infographic, presentation
Gear for systems, fingerprint for security, speedometer for tracking, and checkmark for confirmation. Ideal for technology, security, innovation, process management, validation automation
Computer monitor displaying charts, graphs, lists, and notifications. Adjacent icons include a raised hand and an eye. Ideal for data analysis, monitoring, privacy, analytics security control
Cloud with magnifying glass highlighting an eye featuring a checkmark, symbolizing data monitoring, analysis, and compliance. Ideal for cloud computing, security, privacy, analytics, compliance
Prescription label with medicine bottle, pills, running figure, and facial recognition icon. Ideal for pharmacy, healthcare, fitness, digital health wellness technology compliance. Simple flat
Laptop displaying GDPR compliance tools, security shield, user authentication, and data protection icons. Progress bar highlights privacy tasks. Ideal for technology, cybersecurity, privacy
Warning sign with exclamation mark, a locked cloud symbol, and stacked database. Ideal for cybersecurity, data protection, server risks, storage threats, system warning, online safety simple flat
Job vacancy document with text, video recording icon, and security camera. Ideal for recruitment, surveillance, hiring process, job security, HR management, technology simple flat metaphor
Person figure with clock and biometric fingerprint marked as verified with check symbol. Ideal for security, authentication, attendance, access control, punctuality, identity, workforce. Clean
Large briefcase, fake profile alert with warning icon, and coin symbolizing business fraud, identity verification, risk management, financial transactions, fraud awareness, system security. Ideal
Surveillance camera beside an open envelope, highlighting privacy concerns, data security, and communication monitoring. Ideal for security, privacy, surveillance, data protection, cyber safety
Large folder with a question mark speech bubble. Person authenticating identity at a locked door with profile pictures. Ideal for cybersecurity, privacy, verification, secure access, encryption