• /
We are sorry you canceled your Premium subscription

You can still enjoy Flaticon Collections with the following limits:

  • You can choose only 3 collections to keep
  • You can only add up to 100 icons per collection
  • You cannot add Premium icons to your collection
The advantages of your collections changed
  • You can choose only 3 collections to keep
  • You can only add up to 100 icons per collection
  • You cannot add Premium icons to your collection

Keep making the most of your icons and collections

Get 20% OFF our
Annual Premium Plan

  • /
Select 3 collections to continue:

You have 8 collections but can only unlock 3 of them

    Stay Premium

    Select a color from the icon

      Choose a new color

      History

        Scale

        Move

        Move left
        Move right
        Move up
        Move down

        Rotate

        Rotate 90º right
        Rotate 90º left

        Flip

        Flip horizontal
        Flip vertical

        Select a shape

        None
        Circle
        Rounded square
        Square

        Size

        Color

        Stroke width

        px
        Undo
        Redo
        Icons Animated icons
        Group by:

        Group search results

        You can group your results by author style, pack, or see all available icons on your screen.

        214

        Encrypted system Icons - Page 2

        • Security system
        • Security system
        • Security system
        • Security system
        • System
        • System
        • System
        • System
        • System
        • Key
        • Key
        • Key
        • Scramble
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Data scrambling
        • Firewalls
        • Unauthorized
        • Penetration testing
        • Penetration testing
        • Environment protection
        • Firewall
        • Baseline
        • Testing
        • Unauthorized
        • Warfare
        • Baseline
        • Unauthorized
        • Unauthorized
        • Transmitting
        • Unauthorized
        • Unauthorized
        • Password
        • Registry
        • Integrity
        • Network
        • Unauthorized
        • Security shield
        • Unauthorized
        • Cryptography
        • Spider web
        • Unauthorized
        • Architecture
        • Fortress
        • Audio
        • Cyber security
        • Filtering
        • Cryptography
        • Spider web
        • Cyber security
        • Fake website
        • Transcription
        • Cyber security
        • Fake website
        • Unauthorized
        • Bitcoin
        • Bitcoin
        • Cryptography
        • Cryptography
        • Cryptography
        • Spider
        • Spider
        • Spider
        • Spider
        • Lock
        • End to end
        • Laptop
        • End to end
        • End to end
        • End to end
        • Cyber
        • Cyber
        • Cyber
        • Cyber
        • Cyber
        • Cyber
        • Security
        • Mobile security
        • Mobile security
        • Mobile security
        • Mobile security
        • Authenticity
        • Authenticity
        • Authenticity
        • Authenticity
        • Authenticity
        • Authenticity
        • Database control
        • Database control
        of 3

        How likely are you to recommend Flaticon to a friend?

        0 1 2 3 4 5 6 7 8 9 10
        Not likely Very likely