A link to set your password has been sent to: To access your purchases in the future you will need a password.
Create without limits — unlimited downloads, plus powerful AI editing
Create without limits — unlimited downloads, plus powerful AI editing
New filters added
Sort by

17,842 results for identifies in videos

Data leakage protection identifies real time cybersecurity threat breach risks on laptop screen with AI magnifying glass alert icon securing real data from unauthorized access loss
00:05
Rack focus from smartphone screen of female influencer describing nourishing hair balm on camera promoting skincare product while shooting video with friend for digital marketing at cosmetics store
00:13
Video monitoring system performs biometric facial recognition of people in a public place. AI-controlled CCTV camera identifies and recognizes people. The interface of the surveillance application, 4k
00:16
AI supports candlestick chart analysis to identify financial trends, trading patterns, and investment opportunities for traders, investors, and financial analysts Marrow
00:10
Maintenance specialist closely examining mechanical parts under bright lighting identifying early signs of wear through visual assessment to ensure equipment reliability.
00:06
A smartphone receives an incoming call identified as a scam. The phone is placed on a wooden table. Watch to see the call details and gain awareness of scam alerts.
00:12
OEE acronym, overall equipment effectiveness concept, identifies the percentage of manufacturing time that is truly productive. 3d Motion graphics of technology icon interface background
00:10
Modern interior workspace. Colleagues gathering. Team reviewing tablet and identifying issue. Smiling coworkers discussing solution and coordinating next steps during collaborative work session.
00:22
Facial recognition technology identifies a man with access granted, biometric scan in progress with data displayed
00:08
Medium shot of a technician operating LIDAR equipment outdoors capturing detailed terrain data to identify ore deposit boundaries accurately.
00:05
Realistic sequence of preventing a data breach. Person identifies Istanbul login threat and instantly secures their mobile account. Perfect for fintech, anti-fraud, and identity theft prevention
00:07
Radar Tracking HUD technology identifying multiple mobile target data
00:20
Biometric scanning system identifies female face in crowd on busy street. CCTV camera captures and processes pedestrian data. Camera performs panning and tilting movements.
00:08
Aerial top down view of a city intersection with a digital overlay. Autonomous cars identified and tracked, showing data connection lines
00:10
INCIDENT. Incident Management and Report Business Concept. Incident Response Plan new
00:08
Graph going down animated video clip, describing stock or forex crashing, red arrow falling, investment or finance collapse
00:05
An innovative Ai Lab Discovery unfolds as a cute futuristic robot identifies a complex molecular compound amidst a dark shimmering digital void for science
00:06
OEE acronym, overall equipment effectiveness concept, identifies the percentage of manufacturing time that is truly productive. Business concept, motion graphics. 4k video
00:08
 An French Aircraft Carrier is identified on Military Radar
00:08
Wooden cubes arranged neatly emphasize identified fungal condition. Woman doctor writes prescription for patient concentrating on dosage details
00:17
AI data leakage protection identifies real time cybersecurity threat breach risks with alerts on smartphone screen showing digital security icons and breach prevention
00:05
Nurse scanning patient wristband in a hospital ward. Medical specialist identifying the man in a bed using digital barcode scanner for safe treatment process.
00:05
Motion detection system surveillance camera recognizes people using big data and artificial intelligence. CCTV camera identifies people's faces and objects at the airport. Facial recognition scans, 4k
00:15
AI identifies cybersecurity threat and breach by protecting data, detecting threat, and preventing security risks in real time Marrow
00:10
Engineer in a repair shop interacts with an AI system that visually identifies motherboard problems for efficient troubleshooting.
00:06
Uttar Pradesh state map highlight animation on India map, Uttar Pradesh outlined with location pin and label for geography visuals, news graphics, educational content, and regional presentation video
00:10
OEE acronym, overall equipment effectiveness concept, identifies the percentage of manufacturing time that is truly productive. digital interface on cyan color background
00:10
Cybersecurity Team Analyzing Data - A diverse team of cybersecurity professionals collaborates around computer monitors displaying encrypted data and security protocols, working together to identify
00:08
A white magnifying glass icon appears centered on a black screen with searching written below it to denote an active information scan
00:10
Smartphone displays a facial recognition scanning interface that successfully identifies a user profile and shows an orange unlocked padlock icon to permit secure access to the mobile device menu.
00:10
Modern smartphone identifies a scam call inside a vehicle. Screen displays Suspicious Contact with unverified caller alerts. Essential for cybersecurity training, fraud prevention ads, and mobile
00:11
Radar surveillance detection HUD technology tracks multiple targets
00:20
Careful mushroom harvesting. Caucasian chef carefully inspecting mushrooms during outdoor camping activity. Cautious chef identifies and cleans edible wild mushrooms in sunny outdoor setting
00:16
Elderly woman undergoing a spirometry test at a hospital clinic, exhaling into a device to assess lung capacity and identify respiratory issues such as asthma or copd
00:16
OEE acronym, overall equipment effectiveness concept, identifies the percentage of manufacturing time that is truly productive. Business concept, motion graphics. 4K
00:12
Profile verify icon with check mark animation isolated on white background
00:10
Security camera with facial recognition technology monitors urban crowd. Digital display identifies individuals in real-time on busy city street. Static close-up shot.
00:08
An AI financial advisor interface featuring a rotating radar scanner that identifies market opportunities across various asset classes within a dark holographic digital environment
00:06
Laboratory materials scientist examining biopsy slide with microscope, logging results on clipboard. Senior researcher identifies disease markers in clinical lab, writing report, camera A
00:18
OEE acronym, overall equipment effectiveness concept, identifies the percentage of manufacturing time that is truly productive. Digital illustration
00:12
AI data protection identifies real time cybersecurity threat breach risk and data leakage on USB flash drive alert sign highlighting importance of secure data and breach prevention
00:05
Preventive healthcare emphasizes regular hearing testing to identify early signs of hearing loss and protect long term auditory wellbeing. cinematic color correction, natural uneven lighting yet
00:10
Side view medium shot of female therapist assessing client back and identifying tension points before massage session in wellness room, showing professional consultation and body evaluation
00:11
AI identifies target audiences with smart segmentation and virtual assistants, enabling precise, personalized marketing strategies. Epoch
00:14
Engineer in a repair shop interacts with an AI system that visually identifies motherboard problems for efficient troubleshooting.
00:05
Kerala map highlight animation. India state outline with glowing border, location pin marker on Thiruvananthapuram, regional label, and textured ocean background for geographic visualization
00:10
OEE acronym, overall equipment effectiveness concept, identifies the percentage of manufacturing time that is truly productive. 3d Motion graphics of technology icon interface background
00:10
SMS Tolls Scam Text Simulation Concept - Smishing Attacks Threaten Action for Unpaid Tolls to Collect Sensitive Information and Financial Data Concept
00:18
system risk, data threat, cyber alerts, file security issues, online protection, digital warning alert displayed on laptop with document icons,
00:10
Smartphone displays a facial recognition scanning interface that identifies a user profile and shows a white unlocked padlock icon to grant secure access to digital information on the mobile device.
00:10
Futuristic digital graphic showcasing vulnerability lifecycle, binary code, and neon highlights
00:08
Slow aerial reveal identifies the dark, saturated furrows of a plowed field in the Po Valley, where a week of heavy rain has transformed the silty clay substrate into a waterlogged mosaic PC Italy
00:19
In well-lit medical office, doctor reviews MRI scans and X-ray images, identifying fracture details to secure an accurate diagnosis and devise a suitable treatment plan, emphasizing clinical analysis
00:15
Customer target concept with market segmentation, audience analysis and marketing strategy. Business planning to identify ideal customers and improve campaign performance.
00:15
A single person illuminated amongst a large crowd of grey generic figures emphasizing uniqueness individuality leadership and standing out from the anonymous group representing talent
00:05
Person in safety vest scans barcode on cardboard box in warehouse
00:08
Rear back view smart young confident male hr manager employer holding job interview meeting with skilled vacancy candidate, asking about working experience, describing position talking in office.
00:24
Studying the price change of the digital coin using the smart market database. Smart crypto market database monitoring the cost variations. Smart virtual market database identifies the price rise.
00:14
Laboratory technician examining biopsy slide while colleague documents diagnostic findings on clipboard. Elderly man identifies disease markers in clinical lab with coworker taking notes, camera B
00:16
Staff push down electronic control machine with finger scan to access the door of or data center. The concept of data security or data access control.
00:06
Data protection identifies real time cybersecurity threat risks with AI preventing data leakage and breach securing sensitive information from unauthorized access and damage for secure data management
00:05
Nurse in professional uniform places tourniquet to identify viable and accessible vein on senior man arm. Experienced doctor in rubber gloves ties tourniquet preparing for blood sample collection
00:06
Human nose inhaling particles , bioaerosols , viruses and germs. Microbes  entering nasal passage of person. 3d animation render
00:25
Cybersecurity threat alert protects data. Cyber security threat alert prevents access, alert warns breach, defends system, and cyber security threat alert identifies risk. Marrow
00:10
Worker inspecting crawl space for signs of pest infestation using tools to identify and address hidden issues beneath the floor.
00:05
Assam state map highlight animation on India map, Assam outlined with location pin and label for geography visuals, news graphics, educational content, and regional presentation video
00:10
OEE acronym, overall equipment effectiveness concept, identifies the percentage of manufacturing time that is truly productive. 3d Motion graphics of technology icon interface background
00:10
Artificial Intelligence face scanner. Facial recognition and biometric medical research concept
00:12
Spy analysis network program examining the aerial view of the city. Spy analysis network identifies the coordinates of the terrorist headquarters. Spy analysis network collects target intelligence.
00:22
Dead body waiting to be identified in the morgue
00:13
Suitcases travel along airport baggage carousel while man identifies and lifts luggage. Travelers waiting moving bags, flight arrivals continue, tourism flow, luggage handling, post journey reunions
00:15
Scientist working with blood sample in laboratory. Lab analyst analyzes a blood slide. Doctor or pathologist drops a humans red blood on glass plate. Biological material to identify the virus.
00:28
AI technology for social impact identifies deer forest using handheld device enhancing wildlife observation and nature study with smart digital tools
00:05
Journalist wearing a press pass to identify himself.
00:29
Scanning infections, viral detection, brain imaging. Infection analysis. Pathogens cause severe symptoms. MRI identifies brain abnormalities. Healthcare prevents disease progression.
00:10
Handsome Young Caucasian Man is Identified by Biometric Facial Recognition Scanning Process. Futuristic Concept: Projector Identifies Individual by Illuminating Face by Dots and Scanning with Laser
00:11
African American foreman describing floor plans on paper to male Caucasian building contractor in safety vest and hardhat when working together at construction site
00:14
The blood analysis. Analysis to identify the HIV virus.
00:13
Laboratory materials scientist examining biopsy slide with microscope, logging results on clipboard. Senior researcher identifies disease markers in clinical lab, writing report, camera B
00:16
Emergency response team employing thermal leak detection tools to quickly identify and fix burst pipe damage under urgent conditions.
00:06
AI data leakage protection identifies real time cybersecurity threat breach risks with finger touching glowing unlocked padlock digital circuit board symbolizing data breach risks and cybersecurity
00:05
AI face recognition detector between real image or deep fake image. Distinguishing authentic content from synthetic media. Authentic human reality and digital manipulation by artificial intelligence
00:08
Spy satellite drone monitors traffic on a busy freeway. Surveillance camera scans and identifies moving vehicles. High-tech city security system. Tracking criminals. AI scans surrounding environment.
00:09
AI identifies target audiences with smart segmentation and virtual assistants, enabling precise, personalized marketing strategies. Epoch
00:12
Medium shot of investigator comparing accounting records to identify discrepancies during corporate audit procedures.
00:06
West Bengal state map highlight animation on India map, West Bengal outlined with location pin and Kolkata marker for geography visuals, news graphics, educational content, and regional presentation
00:10
Close view of diverse cheerful volunteers preparing for cleanup of woods. The coordinator allocates responsibilities and identifies areas for cleaning.
00:35
The railroad inspector checks the track to identify deficiencies before the repair is completed
00:08
Healthcare check-up procedure identifies problems with patients artery health. Spotting the problem with heart artery health. Identifying the Cardiac Ischemia artery health problem. Heart disease.
00:15
This clip highlights the dangers of fake email and SMS alerts and how they can impact personal data security. Identify phishing attempts easily.
00:05
A orthopedic doctor or surgeon using a skeletal model of a human knee to aid in his explanation of a diagnosis or repair.
00:11
Positive multi-ethnic team working together at one desk. Listening to young man in middle describing something on screen and making gestures with his hand. Everyone looking at camera and smiling.
00:19
Male doctor's hand pointing at the MRI scan of a patient. Surgeon identifies the problem before the neurosurgery.
00:09
Animated Group of White Blanks Mockups with Shadows lying on Neutral Light background (Flat lay Animation) . Paper Blank Mock Up. Branding Identify, Business Cards or Magazine pages and Social Posts.
00:15
Scanning infections, viral detection, bacterial monitoring. Infection control. Ultrasound shows hidden abscesses. MRI identifies inflammation sites. Laboratory analysis validates pathogen presence.
00:10
Identify User Needs with digital technology concept
00:38
Confident realtor is describing advantages of house to young couple looking around, talking and smiling. Husband and wife are excited about new accommodation.
00:20
A cybersecurity professional works diligently on multiple screens, identifying network vulnerabilities in a dimly lit environment
00:05
Manager correcting programmer mistakes while conducting code review to fix errors, identifying technical issues with company software. Team leader supervising IT staff member optimizing code, camera B
00:25
Camera monitors cars on the highway and identifies tracking data
00:17