[{"data":1,"prerenderedAt":426},["ShallowReactive",2],{"illustration-page:secure-dashboard-3d-illustration:v2":3,"ill-popup:secure-dashboard-3d-illustration:v11":425},{"pack":4,"previews":423,"current":424},["Reactive",5],{"id":6,"name":7,"formats":8,"slug":9,"preview":10},22,"Security 3d illustrations",null,"security-3d-illustrations",[11,28,43,58,73,90,105,120,135,150,165,180,195,210,225,240,255,270,285,300,315,330,345,360,375,391,407],{"id":12,"alt":13,"slug":14,"name":15,"seo_title":15,"seo_desc":16,"type":8,"free":17,"ill_type":18,"avif":19,"png":23,"mp4":8,"scene":27},3950,"3d illustration of a house with security warning shield","home-security-alert-3d-illustration","Home Security Alert 3D Illustration","3D security illustration showing a home with an alert shield, ideal for safety and protection visuals.",false,"themes",{"id":20,"documentId":21,"url":22},4484,"zngpsoiaw42gs72i4yc3cbzr","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_1_f01112ca3e.avif",{"id":24,"documentId":25,"url":26},4495,"vw14sfihmh9knkfqnq3nddhw","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_1_5bb9ea7707.png","obj_1",{"id":29,"alt":30,"slug":31,"name":32,"seo_title":32,"seo_desc":33,"type":8,"free":17,"ill_type":18,"avif":34,"png":38,"mp4":8,"scene":42},3951,"3d illustration of a house with a lock","home-lock-protection-3d-illustration","Home Lock Protection 3D Illustration","Simple 3D home security illustration with a lock icon, perfect for safety and privacy content.",{"id":35,"documentId":36,"url":37},4481,"zo9fr41z3dsy031nlu2lyeay","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_2_a4608fc60f.avif",{"id":39,"documentId":40,"url":41},4503,"qtqs3g5q6fqm2vh97lpat5p4","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_2_4e66cade03.png","obj_2",{"id":44,"alt":45,"slug":46,"name":47,"seo_title":47,"seo_desc":48,"type":8,"free":17,"ill_type":18,"avif":49,"png":53,"mp4":8,"scene":57},3952,"3d illustration of a cursor clicking a secure window","secure-click-3d-illustration","Secure Click 3D Illustration","Modern 3D illustration showing secure clicking, great for web security and login pages.",{"id":50,"documentId":51,"url":52},4475,"s179vs6wdw5jmtiyhat2i43j","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_3_5a7bc088c7.avif",{"id":54,"documentId":55,"url":56},4491,"d0aaebilay7hzz6fzkcy4714","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_3_0607d7cfbe.png","obj_3",{"id":59,"alt":60,"slug":61,"name":62,"seo_title":62,"seo_desc":63,"type":8,"free":17,"ill_type":18,"avif":64,"png":68,"mp4":8,"scene":72},3953,"3d illustration of a security camera","security-camera-3d-illustration","Security Camera 3D Illustration","Clean 3D security camera illustration for monitoring, surveillance, and safety systems.",{"id":65,"documentId":66,"url":67},4477,"rjlv3og0nihj1okf97g89spz","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_4_90e4905224.avif",{"id":69,"documentId":70,"url":71},4497,"i0apx32hhnflc4vwe9jjyox5","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_4_25fb7a4f55.png","obj_4",{"id":74,"alt":75,"slug":76,"name":77,"seo_title":78,"seo_desc":79,"type":8,"free":80,"ill_type":18,"avif":81,"png":85,"mp4":8,"scene":89},3954,"3d illustration of a cloud with a lock","3d-cloud-security-illustration","Free cloud security illustration","Cloud Lock 3D Illustration","3D cloud security illustration with a lock, ideal for data protection and cloud safety pages.",true,{"id":82,"documentId":83,"url":84},9228,"kl0k53p5biahwdt6q8fao9sw","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_5_bf73422d75.avif",{"id":86,"documentId":87,"url":88},9232,"vpt9vni61vf48r25be0y73x2","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_5_5bfa4b6c2a.png","obj_5",{"id":91,"alt":92,"slug":93,"name":94,"seo_title":94,"seo_desc":95,"type":8,"free":17,"ill_type":18,"avif":96,"png":100,"mp4":8,"scene":104},3955,"3d illustration of a secure system window","secure-dashboard-3d-illustration","Secure Dashboard 3D Illustration","Minimal 3D illustration of a secure dashboard, perfect for admin panels and system tools.",{"id":97,"documentId":98,"url":99},4483,"vm7x0gzlc0k5fpnpmmc2pib3","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_6_06e7df6b02.avif",{"id":101,"documentId":102,"url":103},4487,"b40zpgyou3rzrv3vpk7eb44q","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_6_f5103408cc.png","obj_6",{"id":106,"alt":107,"slug":108,"name":109,"seo_title":109,"seo_desc":110,"type":8,"free":17,"ill_type":18,"avif":111,"png":115,"mp4":8,"scene":119},3956,"3d illustration of a globe with warning sign","network-warning-3d-illustration","Network Warning 3D Illustration","3D network warning illustration for online risks, alerts, and security messages.",{"id":112,"documentId":113,"url":114},4482,"szgue4tyl7m44tpen6fb69f2","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_7_77bce77db1.avif",{"id":116,"documentId":117,"url":118},4502,"j8jtlbfl0k5w7b0cz5n4l384","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_7_073dd314e7.png","obj_7",{"id":121,"alt":122,"slug":123,"name":124,"seo_title":124,"seo_desc":125,"type":8,"free":17,"ill_type":18,"avif":126,"png":130,"mp4":8,"scene":134},3957,"3d illustration of a cursor pointer","cursor-pointer-3d-illustration","Cursor Pointer 3D Illustration","Simple 3D cursor pointer illustration for UI actions and user interaction visuals.",{"id":127,"documentId":128,"url":129},9225,"utvtho4xw73t36bws54n3mgz","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_8_f6bd74b693.avif",{"id":131,"documentId":132,"url":133},9230,"yzl6gpkxitdj4rd1l7mkmr2p","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_8_bba65e1370.png","obj_8",{"id":136,"alt":137,"slug":138,"name":139,"seo_title":139,"seo_desc":140,"type":8,"free":17,"ill_type":18,"avif":141,"png":145,"mp4":8,"scene":149},3958,"3d illustration of security keys","security-keys-3d-illustration","Security Keys 3D Illustration","3D keys illustration representing access, permissions, and account security.",{"id":142,"documentId":143,"url":144},4480,"vs1r8z5eb7o9pzkev1b5tvzf","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_9_2572f4412b.avif",{"id":146,"documentId":147,"url":148},4494,"batbg5fv8ji21k4x5brm7omj","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_9_45c5edffe8.png","obj_9",{"id":151,"alt":152,"slug":153,"name":154,"seo_title":154,"seo_desc":155,"type":8,"free":17,"ill_type":18,"avif":156,"png":160,"mp4":8,"scene":164},3959,"3d illustration of firewall with shield","firewall-protection-3d-illustration","Firewall Protection 3D Illustration","Bold 3D firewall illustration with protection shield, perfect for cybersecurity visuals.",{"id":157,"documentId":158,"url":159},4470,"dh84f8k022p9rsmehxpcabz3","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_10_8e4f769f66.avif",{"id":161,"documentId":162,"url":163},4506,"evidus7dgrcva2arljb3lpcl","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_10_bc3e7ea1f6.png","obj_10",{"id":166,"alt":167,"slug":168,"name":169,"seo_title":169,"seo_desc":170,"type":8,"free":17,"ill_type":18,"avif":171,"png":175,"mp4":8,"scene":179},3960,"3d illustration of globe with cursor","secure-internet-access-3d-illustration","Secure Internet Access 3D Illustration","3D illustration showing safe internet access, ideal for VPN and online safety pages.",{"id":172,"documentId":173,"url":174},4473,"iblkgen0o956o9c8ok3l8ge3","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_11_3c62afb4a2.avif",{"id":176,"documentId":177,"url":178},4508,"j0kbuptxjhkromyz7six2llj","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_11_3663b2dc57.png","obj_11",{"id":181,"alt":182,"slug":183,"name":184,"seo_title":184,"seo_desc":185,"type":8,"free":17,"ill_type":18,"avif":186,"png":190,"mp4":8,"scene":194},3961,"3d illustration of an hourglass","time-security-3d-illustration","Time Security 3D Illustration","Minimal 3D hourglass illustration representing time limits and security control.",{"id":187,"documentId":188,"url":189},4472,"uyqwuip187oew7a3bwaeensn","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_12_5076e846e7.avif",{"id":191,"documentId":192,"url":193},4488,"op4hn2h4a1o4usiyr8f4vobn","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_12_3396d16a36.png","obj_12",{"id":196,"alt":197,"slug":198,"name":199,"seo_title":199,"seo_desc":200,"type":8,"free":17,"ill_type":18,"avif":201,"png":205,"mp4":8,"scene":209},3962,"3d illustration of a password lock","password-lock-3d-illustration","Password Lock 3D Illustration","3D password lock illustration for login, authentication, and account protection.",{"id":202,"documentId":203,"url":204},4474,"vxws2i7ar8tlahnwukfes7bx","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_13_9e5e983d27.avif",{"id":206,"documentId":207,"url":208},4493,"hegbpcmbtp7qqrhog95iyrh1","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_13_d55874fea6.png","obj_13",{"id":211,"alt":212,"slug":213,"name":214,"seo_title":214,"seo_desc":215,"type":8,"free":17,"ill_type":18,"avif":216,"png":220,"mp4":8,"scene":224},3963,"3d illustration of server settings","server-security-settings-3d-illustration","Server Security Settings 3D Illustration","3D server security illustration, great for hosting, data centers, and system management.",{"id":217,"documentId":218,"url":219},4468,"pgdj8u097lofnmui90ysriiv","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_14_aa4b712aac.avif",{"id":221,"documentId":222,"url":223},4496,"jyr6v2mvwo845w9348tvzo0w","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_14_a60e938078.png","obj_14",{"id":226,"alt":227,"slug":228,"name":229,"seo_title":229,"seo_desc":230,"type":8,"free":17,"ill_type":18,"avif":231,"png":235,"mp4":8,"scene":239},3964,"3d illustration of a secure safe","secure-safe-3d-illustration","Secure Safe 3D Illustration","3D safe illustration representing protected storage and secure data.",{"id":232,"documentId":233,"url":234},4476,"zzueb5bjdnlnrz5arhhcpyty","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_15_39257a6e14.avif",{"id":236,"documentId":237,"url":238},4507,"koe0w085iuhefsbaqg34rb2e","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_15_a7c5e4830f.png","obj_15",{"id":241,"alt":242,"slug":243,"name":244,"seo_title":244,"seo_desc":245,"type":8,"free":17,"ill_type":18,"avif":246,"png":250,"mp4":8,"scene":254},3965,"3d illustration of a hand cursor","hand-cursor-click-3d-illustration","Hand Cursor Click 3D Illustration","Simple 3D hand cursor illustration for click actions and user interaction.",{"id":247,"documentId":248,"url":249},4471,"z70g8weh531wgiyfokw28wuy","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_16_4c5592625c.avif",{"id":251,"documentId":252,"url":253},4489,"t0j0cuitx08y3p8oytinqbed","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_16_f8925bb306.png","obj_16",{"id":256,"alt":257,"slug":258,"name":259,"seo_title":259,"seo_desc":260,"type":8,"free":17,"ill_type":18,"avif":261,"png":265,"mp4":8,"scene":269},3966,"3d illustration of blocked access warning","blocked-access-3d-illustration","Blocked Access 3D Illustration","3D illustration showing blocked access, perfect for error and restriction messages.",{"id":262,"documentId":263,"url":264},4465,"rtbkbskbk043eexhy7wf76gq","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_17_6fde18306a.avif",{"id":266,"documentId":267,"url":268},4500,"ilhj1oxa51nq20xkydxf6w56","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_17_545b8a8eec.png","obj_17",{"id":271,"alt":272,"slug":273,"name":274,"seo_title":274,"seo_desc":275,"type":8,"free":17,"ill_type":18,"avif":276,"png":280,"mp4":8,"scene":284},3967,"3d illustration of a key","security-key-access-3d-illustration","Security Key Access 3D Illustration","3D key illustration symbolizing access control and security permissions.",{"id":277,"documentId":278,"url":279},4464,"waivyjclqk8zapyhz3a69vu1","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_18_c6fe1063fa.avif",{"id":281,"documentId":282,"url":283},4501,"m7khjw9kft1mlbyv6y1gc06g","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_18_3f31d78293.png","obj_18",{"id":286,"alt":287,"slug":288,"name":289,"seo_title":289,"seo_desc":290,"type":8,"free":17,"ill_type":18,"avif":291,"png":295,"mp4":8,"scene":299},3968,"3d illustration of data leak drops","data-leak-warning-3d-illustration","Data Leak Warning 3D Illustration","3D data leak warning illustration for privacy risks and security alerts.",{"id":292,"documentId":293,"url":294},4467,"yerntmnyajmxlfhl57weez7g","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_19_a67edecccd.avif",{"id":296,"documentId":297,"url":298},4485,"izildnck6p4ar2en2pcxd8go","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_19_3563623c03.png","obj_19",{"id":301,"alt":302,"slug":303,"name":304,"seo_title":304,"seo_desc":305,"type":8,"free":17,"ill_type":18,"avif":306,"png":310,"mp4":8,"scene":314},3969,"3d illustration of blocked bug symbol","no-bug-allowed-3d-illustration","No Bug Allowed 3D Illustration","3D illustration showing blocked bugs, ideal for malware and threat protection visuals.",{"id":307,"documentId":308,"url":309},4461,"ovyp5lqs0julkd9uqs614p6r","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_20_9fa3eed948.avif",{"id":311,"documentId":312,"url":313},4505,"zoug9x6i3nb9je8yfut8elqv","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_20_a01cb6187e.png","obj_20",{"id":316,"alt":317,"slug":318,"name":319,"seo_title":319,"seo_desc":320,"type":8,"free":17,"ill_type":18,"avif":321,"png":325,"mp4":8,"scene":329},3970,"3d illustration of shield with check mark","shield-check-protection-3d-illustration","Shield Check Protection 3D Illustration","3D shield illustration with check mark, perfect for verified security and trust signals.",{"id":322,"documentId":323,"url":324},4469,"sj45yji2sltfk6ep8fcdbn2d","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_21_8eb3b773e2.avif",{"id":326,"documentId":327,"url":328},4504,"t7stlvxq2jkkwohqfqrcdi3e","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_21_f45e962cf9.png","obj_21",{"id":331,"alt":332,"slug":333,"name":334,"seo_title":334,"seo_desc":335,"type":8,"free":17,"ill_type":18,"avif":336,"png":340,"mp4":8,"scene":344},3971,"3d illustration of secure link connection","secure-connection-3d-illustration","Secure Connection 3D Illustration","3D secure connection illustration for encrypted links and protected networks.",{"id":337,"documentId":338,"url":339},4462,"scyvhu7j0bxeem6nazui5kbe","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_22_30e9db20f3.avif",{"id":341,"documentId":342,"url":343},4498,"hiql3c3x3rkkqw3lkt3n8ycs","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_22_3164117ba0.png","obj_22",{"id":346,"alt":347,"slug":348,"name":349,"seo_title":349,"seo_desc":350,"type":8,"free":17,"ill_type":18,"avif":351,"png":355,"mp4":8,"scene":359},3972,"3d illustration of warning triangle","warning-alert-3d-illustration","Warning Alert 3D Illustration","Clear 3D warning alert illustration for notices, risks and system messages.",{"id":352,"documentId":353,"url":354},4466,"qn45fxp7661z52jiacivyrgl","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_23_398e5f673f.avif",{"id":356,"documentId":357,"url":358},4492,"w7i4gyo7to7wnp5xpfel0wrb","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_23_6bdc6b894b.png","obj_23",{"id":361,"alt":362,"slug":363,"name":364,"seo_title":364,"seo_desc":365,"type":8,"free":17,"ill_type":18,"avif":366,"png":370,"mp4":8,"scene":374},3973,"3d illustration of shield with warning sign","shield-warning-3d-illustration","Shield Warning 3D Illustration","3D shield warning illustration combining protection and alert messaging.",{"id":367,"documentId":368,"url":369},4463,"gtk0w6wscds9e9hol3wp63t8","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_24_8b8e0b3b76.avif",{"id":371,"documentId":372,"url":373},4499,"odpen4lcvcv05umii7vjr544","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_24_b480c0f7a0.png","obj_24",{"id":376,"alt":377,"slug":378,"name":379,"seo_title":380,"seo_desc":381,"type":8,"free":80,"ill_type":18,"avif":382,"png":386,"mp4":8,"scene":390},22821,"Free 3D illustration of a mobile-style pattern lock screen with blue and purple nodes, representing security access","3d-pattern-lock-illustration","Free pattern lock illustration","Pattern lock 3d illustration — Free Download on Wannathis","Show security with this nice 3d illustration. High resolution and changeable colors are included. Download this asset for free and enjoy it.",{"id":383,"documentId":384,"url":385},9224,"v77hgexxaomkcmwuksmcj6t4","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_25_539c62216a.avif",{"id":387,"documentId":388,"url":389},9233,"ubgnfgzc897m076d0wlytc8o","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_25_525b7543f4.png","obj_25",{"id":392,"alt":393,"slug":394,"name":395,"seo_title":396,"seo_desc":397,"type":8,"free":80,"ill_type":18,"avif":398,"png":402,"mp4":8,"scene":406},22822,"Free 3D illustration of a computer screen with a password input field and green asterisks, representing login or authentication","3d-protection-illustration","Free password protection illustration","Password protection 3d illustration — Free Download on Wannathis","Add depth to UI design using 3d elements. This  cute password illustration can be easily customized in Figma via color styles.",{"id":399,"documentId":400,"url":401},9227,"oadeorwuon0hyekak5scps3b","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_26_1fed5a72f6.avif",{"id":403,"documentId":404,"url":405},9229,"quky1hh8ak8w9h1yvw2rrnio","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_26_82cb14b7de.png","obj_26",{"id":408,"alt":409,"slug":410,"name":411,"seo_title":412,"seo_desc":413,"type":8,"free":80,"ill_type":18,"avif":414,"png":418,"mp4":8,"scene":422},22823,"Free 3D illustration of a browser window with a pink and purple hook icon, symbolizing phishing or security alert","web-security-illustration","Free web security 3d illustration","Web security 3d illustration — Free Download on Wannathis","Educate your users about safe web browsing. Attractive gradient and great quality illustrations. Easily change colors for your project right in Figma.",{"id":415,"documentId":416,"url":417},9226,"ttucznfras2kw3cjpzunrssk","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_27_407d7acfed.avif",{"id":419,"documentId":420,"url":421},9231,"ksg7msqcj7n5xfi9ua83yr5o","https://d2pas86kykpvmq.cloudfront.net/uploads/Security_3d_illustrations_27_c9795dd146.png","obj_27",["Reactive",10],["Reactive",90],["Reactive",3],1777963927797]