Skip to content

Browse through our collection of data defense images and stock photos. They are all royalty-free and ready to use for your next project.

Price is in US dollars and excludes tax and handling fees
A masked thief behind a barrier gate. Stop crime. Cyber protection from hackers

A masked thief behind a barrier gate. Stop crime. Cyber protection from hackers

by iLixe48
$5
Soldier in server hub updating secure firmware on military data center hardware

Soldier in server hub updating secure firmware on military data center hardware

$10
Data center army specialists configuring rigs to support AI integration

Data center army specialists configuring rigs to support AI integration

$10
Data center army specialists configuring rigs to support AI integration

Data center army specialists configuring rigs to support AI integration

$10
Military operator and IT expert in army data center using AI on laptop

Military operator and IT expert in army data center using AI on laptop

$10
Military personnel in high tech control room work on data integration

Military personnel in high tech control room work on data integration

$10
Close up of military IT experts in army data center using AI on laptop

Close up of military IT experts in army data center using AI on laptop

$10
Diverse military base employees in data center use isolated mockup tablet

Diverse military base employees in data center use isolated mockup tablet

$10
Close up of army tech expert in data center running simulations with military AI

Close up of army tech expert in data center running simulations with military AI

$10
Army technicians in command center server farm using artificial intelligence

Army technicians in command center server farm using artificial intelligence

$10
AI data center technicians detecting intrusion, trying to salvage networks

AI data center technicians detecting intrusion, trying to salvage networks

$10
Team analyzing cyber threats using monitors in a security operations center

Team analyzing cyber threats using monitors in a security operations center

by kjekol
$4
Analysts using tablet in SOC conducts collaborative cybersecurity monitoring

Analysts using tablet in SOC conducts collaborative cybersecurity monitoring

by kjekol
$4
Army operators in server hub using device to run drone control software

Army operators in server hub using device to run drone control software

$10
Military technicians in data center reviewing drone surveillance footage

Military technicians in data center reviewing drone surveillance footage

$10
Army tech soldier and engineers using green screen on tablet

Army tech soldier and engineers using green screen on tablet

$10
Soldier and colleague use satellite gear to look at aerial map

Soldier and colleague use satellite gear to look at aerial map

$10
Young male cybersecurity analyst monitoring network data and threat intelligence dashboards

Young male cybersecurity analyst monitoring network data and threat intelligence dashboards

by kjekol
$4
Woman in server room command center managing military operations using laptop

Woman in server room command center managing military operations using laptop

$10
Woman in server room command center managing military operations using laptop

Woman in server room command center managing military operations using laptop

$10
Server room army specialists utilizing deep learning algorithms

Server room army specialists utilizing deep learning algorithms

$10
Military officer managing logistics operations using laptop in server room

Military officer managing logistics operations using laptop in server room

$10
Server room army specialists utilizing deep learning algorithms

Server room army specialists utilizing deep learning algorithms

$10
Army technician in command center server hub using laptop

Army technician in command center server hub using laptop

$10
The threat of cyberattacks on the energy and industrial sectors. Hackers attack the economy

The threat of cyberattacks on the energy and industrial sectors. Hackers attack the economy

by iLixe48
$5
Data center army officer in uniform checks missile targeting software on laptop

Data center army officer in uniform checks missile targeting software on laptop

$10
Cyber investigation team working in a governmental hacking room

Cyber investigation team working in a governmental hacking room

$10
Confident cybersecurity professional analyzing data while communicating in a monitoring environment

Confident cybersecurity professional analyzing data while communicating in a monitoring environment

by kjekol
$4
Silver padlock on a white keyboard.

Silver padlock on a white keyboard.

$5
Empty cyber operations center for governmental hacking and threat detection

Empty cyber operations center for governmental hacking and threat detection

$10