Toggle filters
    Photos
    Expand filters
    • Search by Image
    Reset color
    Toggle filters
    Photos
    Expand filters
    • Search by Image
    Reset color

    Defense And Security Photos & Images

     - 12,465 high resolution, royalty free stock photos and pictures matching Defense And Security

    of 100
    • Military personnel working in a government cyber defense center, cyber attack prevention. Soldiers team securing sensitive data from spyware, ransomware and other malware threats. photo
    • Military personnel in a modern command post work on data processing, integrating real time surveillance in strategic planning for a mission. Security protocols for national defense operations. photo
    • Soldiers marching through a muddy trail in a dense forest during a training exercise photo
      Free
    • Army staff in a high tech control room managing crucial defense information, gathering live surveillance data to maintain security protocols. Military crew members working on reconnaissance. photo
    • Military officer leading team with determination and focus, showcasing teamwork and strength photo
      Free
    • AI generated soldiers wearing masks and firearms in the dark photo
      Free
    • Army intelligence expert utilizes modern computer systems and satellite radar imagery to enhance national security, support strategic initiatives and ensure defense in a mission control center. photo
    • Army soldier in a high tech monitoring room conducts a videocall, leveraging secure communication channels and real time intelligence for effective mission coordination. National defense activity. photo
    • Soldier squad team walking in urban environment colored lightis photo
    • Soldier squad team walking in urban environment colored lightis photo
    • A professional soldier undertakes a perilous mission in an abandoned building illuminated by neon blue and purple lights photo
    • Soldier squad team walking in urban environment colored lightis photo
    • Soldier squad team walking in urban environment colored lightis photo
    • A professional soldier undertakes a perilous mission in an abandoned building illuminated by neon blue and purple lights photo
    • A group of professional soldiers bravely executes a dangerous rescue mission, surrounded by fire in a perilous building. photo
    • A professional cameraman captures the intense moments as a group of skilled soldiers embarks on a dangerous mission inside an abandoned building, their actions filled with suspense and bravery photo
    • Soldier portrait on white photo
      Free
    • Soldier squad team walking in urban environment colored lightis photo
    • AI generated soldiers and snipers on the ground photo
      Free
    • A professional soldier undertakes a perilous mission in an abandoned building illuminated by neon blue and purple lights photo
    • A professional soldier undertakes a perilous mission in an abandoned building illuminated by neon blue and purple lights photo
    • Security Guard Standing in Hallway with Red Neon Lights photo
    • soldier glitch view photo
      Free
    • Military experts in a mission control center use modern technology on computer and big screen, analyzing satellite footage and data. Specialist tracking potential threats for intelligence operations. photo
    • A black man in military uniform saluting photo
      Free
    • soldier glitch view photo
      Free
    • Government army hackers engaged in hybrid warfare strategies in agency office. Personnel using software and technology to secure information, prevent attacks and protect military operations. photo
    • A soldier saluting in uniform photo
      Free
    • Intelligence corps expert in military HQ base gathering information on enemy troops. Officer arriving at work in base of operations, starting assessment of enemy vulnerabilities, tracking, camera A photo
    • Army professional in command center talks on phone call and gives crucial information, overseeing satellite data in real time. Protect national security and support strategic military missions. photo
    • Military agent working overtime in control room to analyze aerial reconnaissance data, feeling tired. Exhausted intelligence corps agent controlling drones, suffering from headache, camera A photo
    • Army intelligence specialists utilize advanced computer systems, surveillance technology and satellite data to enhance national security. Working in a command post against potential threats. photo
    • A soldier stands confidently in tactical gear against a backdrop of the American flag during a training exercise photo
    • Soldier portrait on white photo
      Free
    • Army professionals in command post overseeing satellite data and real time surveillance, mission intelligence. Working to support strategic military operations, studying world map and big screen. photo
    • Soldiers working in governmental facility, doing surveillance with digital radar equipment, operating missile systems. Man monitoring army HQ CCTV for any unauthorized activity, camera B photo
    • Military officer leads cybersecurity efforts in a high tech control center, ensuring data protection and managing surveillance systems, Coordinating national security operations. Camera B. photo
    • Army personnel providing information for a new national safety mission, diverse team briefing the troopers in a military base of operations. Specialists working in reconnaissance division. photo
    • Private monitors national guard activity with federal CCTV radar system, working with a green screen layout on pc in control center. IT reconnaissance operator tracking ships on world map. photo
    • Army intelligence specialists using advanced computer systems and satellite data to enhance national security, critical information. Soldiers planning for mission in high tech control room. Camera A. photo
    • Military staff overseeing intelligence gathering activity to offer support to infantry unit in the field, ensuring national safety and defense. Trooper coordinating recruits team in control room. photo
    • Officer monitoring real time cctv surveillance for intelligence gathering, ensuring important data for radar satellite. Employing high tech gear and big screen, supporting military operations. photo
    • closeup of soldier hands putting protective battle gloves photo
      Free
    • Military dispatcher relays info from army intelligence analysts to troops on front lines, close up shot. Radio communications operator wearing uniform talking in headset mic, camera B photo
    • Government army hackers engaged in hybrid warfare strategies in agency office. Personnel using software and technology to secure information, prevent attacks and protect military operations. photo
    • Security guard standing guarding airport terminal entrance watching passengers photo
    • soldier in action aiming laseer sight optics photo
      Free
    • Army intelligence specialists use advanced computer systems and satellite data to enhance national security. Provide critical information and strategic planning in a high tech military control room. photo
    • Military hackers in a secret service cyber operations room working on national security. Fighting cyber terrorism during information war and protecting against digital conflicts, high tech. photo
    • Military IT experts conducting surveillance and espionage activities using advanced technology and big screen. Governmental agency protecting against cyber threats and digital mercenaries. photo
    • Army specialists use advanced computer systems and big screen to gather intelligence, studying radar satellite data to enhance national security. High tech military control room base of operations. photo
    • soldier glitch on white photo
      Free
    • Army specialist employing AI tech to improve military warfare systems and threat monitoring. IT admin uses neural networks to enhance combat operational capabilities, camera B photo
    • Soldiers analyzing and collecting real time data in a high tech military office, working on intelligence gathering for successful defense operation. Ensure military objectives for protection. photo
    • soldier praying tespih photo
      Free
    • Reconnaissance department operator gathering information crucial for a national safety mission, transmitting intelligence to the troops. Telecommunications personnel in command post. Camera B. photo
    • Military officer leads cybersecurity efforts in a high tech control center, ensuring data protection and managing surveillance systems, Coordinating national security operations. Camera A. photo
    • Military IT experts conducting surveillance and espionage activities using advanced technology and big screen. Governmental agency protecting against cyber threats and digital mercenaries. photo
    • Woman army officer operates on gps surveillance footage to gather crucial information about enemy plans. Operator examines a satellite world map to provide support to field troops. Camera B. photo
    • modern warfare soldier photo
      Free
    • modern warfare soldier pink backgorund photo
      Free
    • Naval vessel with sailors on deck in uniform photo
      Free
    • Army telecommunication systems operator using radio gear, providing combat support, doing patriotic duty. African american military dispatcher managing communications networks, camera A photo
    • Armed terrorist with an AK47 faces off against masked special forces operative both armed and in combat attire photo
    • Special operations engineer examining surveillance CCTV footage to gather crucial information for a new mission, working on reconnaissance in general headquarters. Army conscripts in command post. photo
    • Armed forces cyber security team conducting top secret investigations, using advanced technology for secure communication and threat detection. Classified military information. photo
    • Military unit leader conducts reconnaissance operation to gather data and support troops in the field. Uses command center gear to provide crucial information, federal satellite radar. Camera B. photo
    • Military hackers working on cyber security in a high tech government center. Focusing on network protection, encryption and preventing cyber attacks to safeguard state secrets. photo
    • Naval vessel with sailors on deck in uniform photo
      Free
    • Middle Aged Male Russian Soldier in Military Gear Standing with Arms Crossed in Front of Army Trucks photo
    • Staff sergeant providing mission files to brief his operational crew, working on gathering intelligence from surveillance systems. Prepares for various combat scenarios and outcomes. Camera B. photo
    • Government military hackers engaged in hybrid warfare strategies. Using sophisticated software and technology to secure information, prevent breaches and protect military operations. Camera B. photo
    • AI generated Two soldier of police special forces stand in a hangar for protect the area. photo
    • US soldiers in a high tech command center protecting classified information, ensuring cybersecurity and defending against cyber attacks. Army base of operations with trained officers. Camera B. photo
    • Navy operations specialist reading new mission case files in command center, working with satellite real time data projection on a big screen. Soldier enlisted in national army defense program. photo
    • Military specialist oversees cybersecurity operations in a high tech monitoring room, protecting classified data and state secrets by supervising CCTV satellite surveillance systems. photo
    • Military agent working in control room, using software on tablet, analyzing aerial reconnaissance data. Close up of intelligence corps expert controlling drones with portable device, camera B photo
    • Special forces team ready for operation photo
    • Army expert working in governmental facility operating surveillance tech, evaluating target data. Soldier doing job in HQ base of operations, engage enemy forces, camera B photo
    • Military IT experts working on cyber security in a high tech government office. Focusing their duty on network protection, encryption and safeguarding state secrets from digital mercenaries. photo
    • Navy operation specialists monitoring surveillance radar through a hologram, working with 3d illustrations in a military control center. Team of generals gathering intelligence. Camera A. photo
    • Navy operation specialists monitoring surveillance radar through a hologram, working with 3d illustrations in a military control center. Team of generals gathering intelligence. Camera B. photo
    • Team of military specialists monitors satellite data and real time information, coordinates strategic missions. Working on decision making and national security in a high tech operations room. photo
    • Military personnel studying a projection on hologram in command post, working on new defense operation plan. Soldier looking at real time CCTV satellite data on a holographic visualization. photo
    • Programming engineer soldier handles AI brain and deep learning data on computer in command post, coordinates national defense operations. Neural network artificial intelligence science. Camera B. photo
    • AI generated Freshness and flavor in a homemade vegetarian beef stew generated by AI photo
      Free
    • AI generated Police raid, drug and illegal arms and goods seizure by police officers photo
    • Team of military specialists overseeing surveillance activity by using a cctv footage and radar, pointing at a big screen and world map. High tech control center base of operations. photo
    • Army IT professional supervising data collecting activity from a big screen, processing strategic information to create a new map for field operations. Military defense program in control room. photo
    • Concept of cyber security designed as lock on defensive shield. Postproducted illustration. photo
      Free
    • Concept of cyber security designed as lock on defensive shield. Postproducted illustration. photo
      Free
    • Concept of cyber security designed as lock on defensive shield. Postproducted illustration. photo
      Free
    • Concept of cyber security designed as lock on defensive shield. Postproducted illustration. photo
      Free
    • Concept of cyber security designed as lock on defensive shield. Postproducted illustration. photo
      Free
    • Massive tall black iron doors from a medieval castle, heavy and fortified, designed for security and defense, evoking ancient craftsmanship photo
      Free
    • Military Armored Truck in Desert Landscape Robust 6x6 Vehicle photo
      Free
    • Military jet aircraft flying through explosions in cloudy sky photo
      Free
    • Three bullets with a pink glow on a dark surface photo
      Free
    • A knight in shining golden armor with a black feather photo
      Free
    • Female soldier in camouflage helmet and goggles photo
      Free
    • Cyber Security Data Protection Business Technology Privacy concept
      Sponsored
    • IT expert monitors AI brain intelligence system to collect crucial real time data for a new defense military operation on pc in command post. Security protocols for an intense mission. Camera B.
      Sponsored
    • In Data Center Two Military Men Work with Open Server Rack Cabinet. One Holds Military Edition Laptop.
      Sponsored
    • Young Male Security Guard Standing At The Entrance
      Sponsored
    • Cybersecurity Concept. A person holds a smartphone displaying a shield with a lock symbol, surrounded by various cyber security icons, representing user privacy, and data encryption. Secure technology
      Sponsored
    • Cyber security, The Businessperson pointing to the Cybersecurity icon and a digital key in the image, emphasizing online security. Soft hands assure trust and safety in your online business endeavors.
      Sponsored
    • Businessman hand use smartphone with padlock icon technology, Cyber Security Data Protection Business Technology Privacy concept, Internet Concept of global business.
      Sponsored
    • Cybersecurity for Business in the Digital Age, Tech Security Online Privacy Smart Security Software Global Network Protection Digital Business Security Financial Data Security
      Sponsored
    • data protection and cybersecurity concept, internet network security online with padlock icon
      Sponsored
    • lock mark cybersecurity internet, protect attacks from a hacker. concept of password privacy on an online system, secure data from crime, virus cyber. cyber security technology digital information.
      Sponsored
    Log In to Vecteezy
    or
    Reset Password
    Back to Log In →
    Single Sign-on

    Log in with your team's identity provider:

    ← Back to Log In