• Login
  • Sign Up
Member Area
  • Login
  • Sign Up
 English
    • Afrikaans formal
    • Afrikaans informal
    • Arabic
    • Azerbaijan
    • Brazilian
    • Bulgarian
    • Catalan
    • Chinese simplified
    • Chinese traditional
    • Croatian
    • Czech
    • Danish
    • Dutch
    • English
    • Estonian
    • Finnish
    • French
    • Georgian
    • German
    • Greek
    • Hebrew
    • Hungarian
    • Icelandic
    • Indonesian
    • Italian
    • Japanese
    • Latvian
    • Lithuanian
    • Malaysian
    • Norwegian
    • Persian
    • Polish
    • Portuguese
    • Romanian
    • Russian
    • Serbian
    • Slovakian
    • Slovenian
    • Spanish
    • Swedish
    • Thai
    • Turkish
    • Ukrainian
    • Vietnamese
VideotonStock
Your Shopping Cart is empty.
  • Files

    Stock

    • Photo
    • Video

    Special offer

    • Collections
    • Packages
    • Lightboxes

    Licenses

    • Royalty free
    • Rights managed
    • Creative
    • Editorial

    Items

    • Most downloaded
    • Featured
    • Most popular
    • New
    • Free
  • Categories

    Browse categories

  • Site info

    Site info

    • About
    • Support
    • Privacy Policy
    • Privacy Policy
    • FAQ
    • Contact Us
    • Contact Us
    • Terms and Conditions
    • Buyer Agreement
    • Seller Agreement

    Customers

    • Users
    • Credits

    Photographers

    • Boby Richards   0
    • Boby Richards   0
    • Videoton1   286
Search
Keywords:
Creator ID:
Type:
Categories:
Languages:
Orientation:
Color:
Model property release:
Duration Video:

Results (0)

 Auto paging
 Menu
Punjab Map Exploring the Land of Five Rivers
Punjab Map Exploring the Land of Five Rivers

Secure Remote Online Notarization (RON) is a technology-enabled process that allows documents to be notarized remotely using electronic signatures
Secure Remote Online Notarization (RON) is a technology-enabled process that allows documents to be notarized remotely using electronic signatures

Madhubani or Mithila painting of Bihar. It is a traditional painting done by the women of Mithila region of Bihar in india
Madhubani or Mithila painting of Bihar. It is a traditional painting done by the women of Mithila region of Bihar in india

Legend of Parshuram Protector of Dharma and Vanquisher of Evil
Legend of Parshuram Protector of Dharma and Vanquisher of Evil

Vision Focus Eyeglasses Icon
Vision Focus Eyeglasses Icon

Speed Motion Skateboard Icon
Speed Motion Skateboard Icon

 Precise Timekeeping Clock Icon
Precise Timekeeping Clock Icon

Cooling Appliance Refrigerator Icon
Cooling Appliance Refrigerator Icon

Clean Air Symbol Air Filter Efficiency Icon
Clean Air Symbol Air Filter Efficiency Icon

thank you for your support isolated green dark background
thank you for your support isolated green dark background

Fish are a common motif in Madhubani art, symbolizing prosperity, fertility, and good luck
Fish are a common motif in Madhubani art, symbolizing prosperity, fertility, and good luck

Azerbaijan is a transcontinental country located at the crossroads of Eastern Europe and Western Asia, bordered by the Caspian Sea, Russia, Georgia, Armenia, and Iran
Azerbaijan is a transcontinental country located at the crossroads of Eastern Europe and Western Asia, bordered by the Caspian Sea, Russia, Georgia, Armenia, and Iran

Gujarat map highlights major cities like Ahmedabad and Surat, historical sites, industrial zones, and scenic destinations such as Gir National Park and the Rann of Kutch
Gujarat map highlights major cities like Ahmedabad and Surat, historical sites, industrial zones, and scenic destinations such as Gir National Park and the Rann of Kutch

Exploring Chhattisgarh Political and Geographical Boundaries
Exploring Chhattisgarh Political and Geographical Boundaries

Strengthening Cybersecurity Protecting Data in the Digital Age
Strengthening Cybersecurity Protecting Data in the Digital Age

Implement best practices to ensure secure transactions and minimize the risk of data breaches
Implement best practices to ensure secure transactions and minimize the risk of data breaches

 step-by-step guide to problem solving icon
step-by-step guide to problem solving icon

Thank you for your hard work
Thank you for your hard work

Adapting GRC Frameworks to Emerging Industry Regulations
Adapting GRC Frameworks to Emerging Industry Regulations

Regular testing and updating of the incident response plan are essential to ensure its effectiveness in the face of evolving cyber threats
Regular testing and updating of the incident response plan are essential to ensure its effectiveness in the face of evolving cyber threats

Nephrology is the branch of medicine that focuses on the study and treatment of kidney diseases
Nephrology is the branch of medicine that focuses on the study and treatment of kidney diseases

Many organizations are integrating public, private, or hybrid cloud solutions into their data center environments
Many organizations are integrating public, private, or hybrid cloud solutions into their data center environments

Knee damage can also occur from underlying disease such as osteoarthritis, rheumatoid arthritis and systemic lupus erythematosus
Knee damage can also occur from underlying disease such as osteoarthritis, rheumatoid arthritis and systemic lupus erythematosus

 EDB provides tools and utilities for monitoring the health and performance of distributed high availability configurations
EDB provides tools and utilities for monitoring the health and performance of distributed high availability configurations

Hospitals are equipped with state-of-the-art facilities, medical equipment, and technology to support the diagnosis, treatment, and management of various health conditions
Hospitals are equipped with state-of-the-art facilities, medical equipment, and technology to support the diagnosis, treatment, and management of various health conditions

Cloud-native development is an approach to building and running applications that takes full advantage of cloud computing models, making them scalable, resilient, and highly available
Cloud-native development is an approach to building and running applications that takes full advantage of cloud computing models, making them scalable, resilient, and highly available

SASE (Secure Access Service Edge) is a security architecture that combines networking and security services into a unified cloud-native solution
SASE (Secure Access Service Edge) is a security architecture that combines networking and security services into a unified cloud-native solution

phish alarm icon vector design
phish alarm icon vector design

Urban Monolith Skyscraper Silhouette Icon
Urban Monolith Skyscraper Silhouette Icon

Steaming Brew Coffee Cup Icon
Steaming Brew Coffee Cup Icon

Stargazer’s Tool Telescope Icon
Stargazer’s Tool Telescope Icon

Refreshing Sip Beverage Cup Icon
Refreshing Sip Beverage Cup Icon

 Resonance Pitch Tuning Fork Frequency Icon
Resonance Pitch Tuning Fork Frequency Icon

Precision Blade Kitchen Knife Icon
Precision Blade Kitchen Knife Icon

 Presentation Board Business & Education Icon
Presentation Board Business & Education Icon

Organized Workspace Storage Cabinet Icon
Organized Workspace Storage Cabinet Icon

Nature’s Touch Potted Plant Icon
Nature’s Touch Potted Plant Icon

 Lush Growth Potted Plant Icon
Lush Growth Potted Plant Icon

Laundry Cycle Washing Machine Icon
Laundry Cycle Washing Machine Icon

 Kitchen Essential Slotted Spatula Icon
Kitchen Essential Slotted Spatula Icon

Inverted Pendulum Stability & Control Symbol
Inverted Pendulum Stability & Control Symbol

Home Kitchen Essential Cooking Pot Icon
Home Kitchen Essential Cooking Pot Icon

Grill Master Slotted Spatula Icon
Grill Master Slotted Spatula Icon

Eco Emblem Sustainable Leaf Symbol
Eco Emblem Sustainable Leaf Symbol

Cozy Corner Desk with Coffee & Plant Icon
Cozy Corner Desk with Coffee & Plant Icon

Cozy Comfort Winter Mittens Icon
Cozy Comfort Winter Mittens Icon

Chef’s Precision Culinary Knife Icon.
Chef’s Precision Culinary Knife Icon.

Cloud Sync Connected Digital Storage Icon
Cloud Sync Connected Digital Storage Icon

Cloud Harmony Overlapping Sky Symbol
Cloud Harmony Overlapping Sky Symbol

Climate Control Air Conditioner Icon
Climate Control Air Conditioner Icon

 Delhi The Heart of India, Where History Meets Modernity
Delhi The Heart of India, Where History Meets Modernity

Mitigating Cyber Threats Through Proactive Auditing
Mitigating Cyber Threats Through Proactive Auditing

Effective cybersecurity training equips employees with the knowledge to recognize phishing attempts, use strong passwords, and follow best security practices, reducing the risk of breaches
Effective cybersecurity training equips employees with the knowledge to recognize phishing attempts, use strong passwords, and follow best security practices, reducing the risk of breaches

Unlocking Growth with a Strategic Approach Key Principles for Effective Decision Making
Unlocking Growth with a Strategic Approach Key Principles for Effective Decision Making

Mail issues can arise due to various factors such as server outages, incorrect settings, or connectivity problems, leading to delays, failures in sending or receiving messages, or loss of email data
Mail issues can arise due to various factors such as server outages, incorrect settings, or connectivity problems, leading to delays, failures in sending or receiving messages, or loss of email data

Cause Root Analysis Identifying and Addressing the Underlying Factors Behind Issues
Cause Root Analysis Identifying and Addressing the Underlying Factors Behind Issues

Thank you for your patience
Thank you for your patience

Thank you for your help
Thank you for your help

Blurred vision refers to a loss of sharpness in sight, making it difficult to see fine details. It can occur in one or both eyes and may affect only part of the visual field or the entire field of vis
Blurred vision refers to a loss of sharpness in sight, making it difficult to see fine details. It can occur in one or both eyes and may affect only part of the visual field or the entire field of vis

Cyber attackers often target supply chain networks to gain access to multiple organizations through a single point of entry
Cyber attackers often target supply chain networks to gain access to multiple organizations through a single point of entry

Image-guided surgery utilizes advanced imaging techniques, such as computed tomography (CT), magnetic resonance imaging (MRI), and intraoperative imaging, to provide real-time visualization and guidan
Image-guided surgery utilizes advanced imaging techniques, such as computed tomography (CT), magnetic resonance imaging (MRI), and intraoperative imaging, to provide real-time visualization and guidan

Shivaji Maharaj believed in empowering the common people and strengthening their role in society
Shivaji Maharaj believed in empowering the common people and strengthening their role in society

Netaji Subhas Chandra Bose is an Indian Nationalist
Netaji Subhas Chandra Bose is an Indian Nationalist

Hanuman Ji The Hero of the Ramayana and Embodiment of Divine Loyalty
Hanuman Ji The Hero of the Ramayana and Embodiment of Divine Loyalty

cloud preferences
cloud preferences

Cloud Migration Strategies for Businesses
Cloud Migration Strategies for Businesses

Wedding of Ram and Sita in Traditional Madhubani Style.
Wedding of Ram and Sita in Traditional Madhubani Style.

Safeguarding the Digital Age The Imperative of Data Protection
Safeguarding the Digital Age The Imperative of Data Protection

Strong Policies Begin with Precise, Purposeful Writing
Strong Policies Begin with Precise, Purposeful Writing

Retention and Archiving Safeguard Information for the Long Term
Retention and Archiving Safeguard Information for the Long Term

Effective Document Writing Ensures Clear Communication
Effective Document Writing Ensures Clear Communication

Contractor Checks Help Safeguard Data and Workplace Integrity
Contractor Checks Help Safeguard Data and Workplace Integrity

Clear Retention Policies Support Legal and Operational Needs
Clear Retention Policies Support Legal and Operational Needs

Clear Policy Writing Lays the Foundation for Effective Governance
Clear Policy Writing Lays the Foundation for Effective Governance

Well-Written Documents Reflect Professional Standards
Well-Written Documents Reflect Professional Standards

Effective Contractor Checks Protect Company Standards
Effective Contractor Checks Protect Company Standards

Building Trust Through Data Privacy and Security
Building Trust Through Data Privacy and Security

Burundi A Land of Drums, Hills, and Cultural Richness
Burundi A Land of Drums, Hills, and Cultural Richness

Burundi The Heart of Africa with Breathtaking Landscapes
Burundi The Heart of Africa with Breathtaking Landscapes

Burkina Faso A West African Nation of Heritage and Resilience
Burkina Faso A West African Nation of Heritage and Resilience

Burkina Faso The Land of Honest People and Vibrant Culture
Burkina Faso The Land of Honest People and Vibrant Culture

 Bulgaria The Crossroads of Europe and the Balkans
Bulgaria The Crossroads of Europe and the Balkans

Bulgaria A Land of Rich History and Scenic Landscapes
Bulgaria A Land of Rich History and Scenic Landscapes

Brunei A Small Nation with Rich Heritage and Natural Beauty
Brunei A Small Nation with Rich Heritage and Natural Beauty

 Brunei The Abode of Peace in Southeast Asia
Brunei The Abode of Peace in Southeast Asia

Brazil The Land of Diversity and Natural Wonders
Brazil The Land of Diversity and Natural Wonders

Brazil A Vast Nation of Rainforests, Beaches, and Culture
Brazil A Vast Nation of Rainforests, Beaches, and Culture

Unlock Innovation with Scalable Hybrid and Multi-Cloud Solutions
Unlock Innovation with Scalable Hybrid and Multi-Cloud Solutions

 Streamlining Cloud Applications Through Containerization Solutions
Streamlining Cloud Applications Through Containerization Solutions

 Secure, Compliant, and Scalable Cloud Security Services
Secure, Compliant, and Scalable Cloud Security Services

Seamless Hybrid & Multi-Cloud App Development for Maximum Flexibility
Seamless Hybrid & Multi-Cloud App Development for Maximum Flexibility

 Seamless Cloud-As-A-Service Development for Agile and Scalable Growth
Seamless Cloud-As-A-Service Development for Agile and Scalable Growth

Seamless Cloud Infrastructure Management for Business Agility
Seamless Cloud Infrastructure Management for Business Agility

Seamless Cloud Migration Services for a Smooth Digital Transition
Seamless Cloud Migration Services for a Smooth Digital Transition

Reliable Cloud Support & Maintenance for Peak Performance
Reliable Cloud Support & Maintenance for Peak Performance

Reliable Cloud Backup Services for Data Protection and Recovery
Reliable Cloud Backup Services for Data Protection and Recovery

Protect Your Cloud Environment with Advanced Security Solutions
Protect Your Cloud Environment with Advanced Security Solutions

 Innovative Cloud Solutions for Seamless Digital Transformation
Innovative Cloud Solutions for Seamless Digital Transformation

Future-Ready Cloud Architecture for Agility and Innovation
Future-Ready Cloud Architecture for Agility and Innovation

Hassle-Free Cloud Migration Solutions for Scalability and Growth
Hassle-Free Cloud Migration Solutions for Scalability and Growth

  • Home
  • About
  • Support
  • Privacy Policy
  • News

Copyright © 2022 Videoton Media Stock