Skip to content

Browse through our collection of firewall images and stock photos. They are all royalty-free and ready to use for your next project.

Price is in US dollars and excludes tax and handling fees
Rogue programmer successfully tricking firewalls, celebrating accomplishment

Rogue programmer successfully tricking firewalls, celebrating accomplishment

$10
Team of data center technicians analyzing security breaches in firewall

Team of data center technicians analyzing security breaches in firewall

$10
Diverse team of engineers in data center looking for firewall misconfigurations

Diverse team of engineers in data center looking for firewall misconfigurations

$10
Engineers in data center using device, verifying firewall configurations

Engineers in data center using device, verifying firewall configurations

$10
Technicians in data center office using computer, verifying firewall configurations

Technicians in data center office using computer, verifying firewall configurations

$10
Malicious programmer in basement getting past firewalls, handheld camera shot

Malicious programmer in basement getting past firewalls, handheld camera shot

$10
Employee uses device to review firewall rules, enforcing cybersecurity protocols

Employee uses device to review firewall rules, enforcing cybersecurity protocols

$10
Smiling manager in server hub using computer to find firewall misconfigurations

Smiling manager in server hub using computer to find firewall misconfigurations

$10
Hacker typing malicious code to exploit IT security systems and breach firewalls

Hacker typing malicious code to exploit IT security systems and breach firewalls

$10
Secret agent attacking servers in digital warfare, getting rejected by firewall

Secret agent attacking servers in digital warfare, getting rejected by firewall

$10
Hooded man in underground hideaway hacking computers

Hooded man in underground hideaway hacking computers

$10
Professional spy in underground location hired by government to do espionage

Professional spy in underground location hired by government to do espionage

$10
WiFi wireless router, copy space.

WiFi wireless router, copy space.

$5
Cheerful rogue programmer delighted after getting access granted message

Cheerful rogue programmer delighted after getting access granted message

$10
Cybercriminal arriving in underground bunker

Cybercriminal arriving in underground bunker

$10
Close up of IT remote employee writing code using mockup notebook

Close up of IT remote employee writing code using mockup notebook

$10
Rogue programmer at home coding on PC, using AI to evade security

Rogue programmer at home coding on PC, using AI to evade security

$10
Angry programmer feeling frustration after failing to secure company servers

Angry programmer feeling frustration after failing to secure company servers

$10
Professional spy in underground location hired by government to do espionage

Professional spy in underground location hired by government to do espionage

$10
System administrators in data center using devices, executing security patches

System administrators in data center using devices, executing security patches

$10
Programmer stretches body limbs after securing company servers from virus

Programmer stretches body limbs after securing company servers from virus

$10
Hacker in secret hideout getting critical error warning while doing sabotage

Hacker in secret hideout getting critical error warning while doing sabotage

$10
Technician in server farm using isolated screen PC to stop hacker

Technician in server farm using isolated screen PC to stop hacker

$10
Woman checking data center systems bottlenecks using mockup tablet

Woman checking data center systems bottlenecks using mockup tablet

$10
Manager in server hub overseeing workers using computer

Manager in server hub overseeing workers using computer

$10
Programmer scratching head in confusion trying to secure company servers

Programmer scratching head in confusion trying to secure company servers

$10
WiFi wireless router, copy space.

WiFi wireless router, copy space.

$5
Tired hacker at desk yawning after coding all night, using AI to evade security

Tired hacker at desk yawning after coding all night, using AI to evade security

$10
Cheerful rogue programmer delighted after getting access granted message

Cheerful rogue programmer delighted after getting access granted message

$10
Green security shield

Green security shield

$5