Skip to content

Secure Files Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees
Cloud computing for document management. Man using virtual interface to organize and secure files.

Cloud computing for document management. Man using virtual interface to organize and secure files.

$4
Cyber officer encrypting big chunks of data in order to secure important files.

Cyber officer encrypting big chunks of data in order to secure important files.

$10
Labels in filing cabinet representing different levels of security

Labels in filing cabinet representing different levels of security

$5
Confident security agent posing with his baton and clipboard files

Confident security agent posing with his baton and clipboard files

$10
Security for businesses and entrepreneurs. Protection of users and encrypted files in the cloud.

Security for businesses and entrepreneurs. Protection of users and encrypted files in the cloud.

$4
Thief bypasses photovoltaics factory security, extracting company files

Thief bypasses photovoltaics factory security, extracting company files

$10
Businessman Using Document Management System Technology to Securely Store Digital Files

Businessman Using Document Management System Technology to Securely Store Digital Files

$4
Vertical photo of Encrypted file protection in the cloud. Advanced security for enterprises.

Vertical photo of Encrypted file protection in the cloud. Advanced security for enterprises.

$4
Cybersecurity, protection of the user's private data, files and documents. Security Internet.

Cybersecurity, protection of the user's private data, files and documents. Security Internet.

$4
African american security agent writing details on his notebook files

African american security agent writing details on his notebook files

$10
Securely share and back up files with cloud technology and digital systems: FTP solutions

Securely share and back up files with cloud technology and digital systems: FTP solutions

$4
Locker with key and empty key tag in office. Filing cabinet lock with key for safety and security

Locker with key and empty key tag in office. Filing cabinet lock with key for safety and security

by Fahroni
$5
Locker with key in office room. Filing cabinet lock with key for safety and security system in pub

Locker with key in office room. Filing cabinet lock with key for safety and security system in pub

by Fahroni
$5
Criminal board with evidence in police archive office

Criminal board with evidence in police archive office

$10
Expert programmers developing data decryption high tech software in order to save corrupted files

Expert programmers developing data decryption high tech software in order to save corrupted files

$9
Asian software developer engineering an autonomous defence system

Asian software developer engineering an autonomous defence system

$9
Vertical photo about the cybersecurity, protection of the user's private data, files and documents.

Vertical photo about the cybersecurity, protection of the user's private data, files and documents.

$4
Security guard a large yellow cabinet with cells

Security guard a large yellow cabinet with cells

$5
Security guard a large yellow cabinet with cells

Security guard a large yellow cabinet with cells

$5
Investigator on suspicious investigation

Investigator on suspicious investigation

$10
African american security agent takes notes to keep evidence of responsibilities

African american security agent takes notes to keep evidence of responsibilities

$10
Detective board in private investigation room

Detective board in private investigation room

$10
Confused puzzled cyber security expert requesting team help to identify unknown generated anomaly

Confused puzzled cyber security expert requesting team help to identify unknown generated anomaly

$9
Cyber security company employee developing blockchain based database processing system

Cyber security company employee developing blockchain based database processing system

$9
Cyber security agency employees using laptop to monitoring internet bandwidth and database used

Cyber security agency employees using laptop to monitoring internet bandwidth and database used

$9
Private detective reading crime information records

Private detective reading crime information records

$10
Software developers analyzing received encrypted files by scanning them for malware

Software developers analyzing received encrypted files by scanning them for malware

$9
technology

technology

by zelmab
$5
Confident african american network developer engineering application for company database.

Confident african american network developer engineering application for company database.

$10
technology

technology

by zelmab
$5