We use cookies per our Cookie Policy to make your experience better.
We use cookies per our Cookie Policy to make your experience better.
threats containment icon

Customize this icon

Icon
Rotate icon 15 degrees counterclockwise
Rotate icon 15 degrees clockwise
Background

Threats containment

PNG & SVG icon formats

From icon set: Cybersecurity
About this icon
Image# 8238154
Uploaded January 07, 2026
Search for icons with a similar style
You may also like
    • Threats eradication Icon 8238152
    • threat protection Icon 8238157
    • firewall Icon 7548941
    • Data Recovery Icon 8238167
    • update software Icon 8238163
    • Detection and analysis Icon 8238155
    • Secure Folder Icon 5893776
    • vulnerability scanning Icon 5893766
    • Security Icon 6250660
    • command and control Icon 8238171
    • data confidentiality Icon 8238170
    • Protection availability Icon 8238169
    • Data Integrity Icon 8238168
    • Install a firewall Icon 8238164
    • password protection Icon 8238160
    • ransomware Icon 8238150
    • trojan Icon 8238149
    • Drive-by attacks Icon 8238148
    • malware Icon 8238147
    • anonymisation Icon 7691438
    • Trusted environments Icon 7691437
    • Purpose limitation Icon 7691436
    • data transparency Icon 7691435
    • Data Analysis Icon 7691434
    • Storage limitation Icon 7691433
    • data optimization Icon 7691432
    • Initial check Icon 7691431
    • data management Icon 7691430
    • data governance Icon 7691429
    • Zero-knowledge proofs Icon 7691428
    • Confidential computing Icon 7691427
    • Multiparty computation Icon 7691116
    • synthetic data Icon 7691115
    • Differential privacy Icon 7691114
    • threat monitoring Icon 8268837
    • cybersecurity threats Icon 7347148
    • threat assessment Icon 7134665
    • virus protection Icon 7769465
    • virus protection Icon 7769439
    • Security Scan Icon 6026198