This site uses cookies. By continuing to browse the ConceptDraw site you are agreeing to our Use of Site Cookies.
The vector stencils library "AWS Security, Identity and Compliance" contains 25 Amazon Web Services security, identity and compliance icons.
Use it to draw AWS architecture diagrams with ConceptDraw PRO software.
Amazon Security, Identity and Compliance services includes: "Amazon Cloud Directory (Create flexible cloud-native directories), AWS Identity & Access Management (Manage User Access and Encryption Keys), Amazon Inspector (Analyze Application Security), AWS Certificate Manager (Provision, Manage, and Deploy SSL/ TLS Certificates), AWS CloudHSM (Hardware-based Key Storage for Regulatory Compliance), AWS Directory Service (Host and Manage Active Directory), AWS Key Management Service (Managed Creation and Control of Encryption Keys), AWS Organizations (Policy-based management for multiple AWS accounts), AWS Shield (DDoS Protection), AWS WAF (Filter Malicious Web Traffic)" [aws.amazon.com]
The AWS icons example "Design elements - AWS Security, Identity and Compliance" is included in the AWS Architecture Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
Amazon Web Services icons
Amazon Web Services icons, temporary security credential, role, permissions, long-term security credential, filtering rule, encrypted data, data encryption key, certificate manager, agent, add-on, MFA token, IAM, AWS Identity and Access Management, Amazon macie, Amazon cloud directory, Amazon Inspector, AWS WAF, AWS Shield, AWS STS, alternate, AWS STS, AWS Organizations, AWS KMS, AWS Directory Service, AWS CloudHSM, AWS Certificate Manager, AWS Artifact,
"A website, also written as Web site, web site, or simply site, is a set of related web pages served from a single web domain. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet address known as a Uniform resource locator. All publicly accessible websites collectively constitute the World Wide Web.
A webpage is a document, typically written in plain text interspersed with formatting instructions of Hypertext Markup Language (HTML, XHTML). A webpage may incorporate elements from other websites with suitable markup anchors.
Webpages are accessed and transported with the Hypertext Transfer Protocol (HTTP), which may optionally employ encryption (HTTP Secure, HTTPS) to provide security and privacy for the user of the webpage content. The user's application, often a web browser, renders the page content according to its HTML markup instructions onto a display terminal.
The pages of a website can usually be accessed from a simple Uniform Resource Locator (URL) called the web address. The URLs of the pages organize them into a hierarchy, although hyperlinking between them conveys the reader's perceived site structure and guides the reader's navigation of the site which generally includes a home page with most of the links to the site's web content, and a supplementary about, contact and link page." [Website. Wikipedia]
The flow chart example "Website launch" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Flowcharts solution from the area "What is a Diagram" of ConceptDraw Solution Park.
Flowchart - Website launch
Flowchart - Website launch, terminator, process, preparation,
Used Solutions
"Web container (also known as a Servlet container) is the component of a web server that interacts with Java servlets. A web container is responsible for managing the lifecycle of servlets, mapping a URL to a particular servlet and ensuring that the URL requester has the correct access rights. A web container implements the web component contract of the Java EE architecture, specifying a runtime environment for web components that includes security, concurrency, lifecycle management, transaction, deployment, and other services. A web container provides the same services as a JSP container as well as a federated view of the Java EE platform APIs." [Web container. Wikipedia]
The UML activity diagram example "Servlet container" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Rapid UML solution from the Software Development area of ConceptDraw Solution Park.
UML activity diagram
UML activity diagram, initial, final, decision, merge, action,
The vector stencils library "Logical symbols" contains 49 logical symbols for drawing logical network topology diagrams.
"Logical topology, or signal topology, is the arrangement of devices on a computer network and how they communicate with one another. How devices are connected to the network through the actual cables that transmit data, or the physical structure of the network, is called the physical topology. Physical topology defines how the systems are physically connected. It represents the physical layout of the devices on the network. The logical topology defines how the systems communicate across the physical topologies.
Logical topologies are bound to network protocols and describe how data is moved across the network. ... EXAMPLE : twisted pair Ethernet is a logical bus topology in a physical star topology layout. While IBM's token ring is a logical ring topology, it is physically set up in star topology." [Logical topology. Wikipedia]
The icons example "Logical symbols - Vector stencils library" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Computer and Networks solution from the Computer and Networks area of ConceptDraw Solution Park.
www.conceptdraw.com/ solution-park/ computer-and-networks
Coaxial Line Tag
Coaxial  Line Tag, coaxial line tag,
Fiber Optic Line Tag
Fiber Optic Line Tag, fiber optic line tag,
Twisted Pair Line Tag
Twisted Pair Line Tag, twisted pair line tag,
SC2200 Signaling Controller
SC2200 Signaling Controller, SC2200 Signaling Controller,
Bridge
Bridge, bridge,
Network Management Appliance
Network Management Appliance, network management appliance,
Access Server (Communications Server)
Access Server (Communications Server), access server, communications server,
Terminal Server
Terminal Server, terminal server,
Web Browser
Web Browser , Web browser ,
Security Management, Cisco
Security Management, Cisco, security management, Cisco,
Lock and Key
Lock and Key, lock and key,
Lock
Lock, lock,
Key
Key, key,
Relational Database
Relational Database, relational database,
Host
Host, host,
CSU/DSU
CSU/DSU , CSU, DSU ,
WAN
WAN, WAN,
University
University , university ,
Government building
Government building , government building ,
Home Office
Home Office, home office,
Telecommuter House PC
Telecommuter House PC, telecommuter house PC,
Medium Building, Regular
Medium Building, Regular, building,
Headquarters, Subdued
Headquarters, Subdued, headquarters,
House, Regular
House, Regular, house,
Small Business
Small Business , small business ,
Network Connector
Network Connector,
Dynamic Connector
Dynamic Connector,
Line Connector
Line Connector,
Line-curve Connector
Line-curve Connector,
Bus
Bus, bus,
FDDI Ring
FDDI Ring, FDDI ring,
Peer-to-peer
Peer-to-peer, peer-to-peer,
Token-ring
Token-ring, Token-ring,
Star
Star, star,
Comm-link
Comm-link, Comm-Link,
Curved Bus
Curved Bus, curved bus,
Ethernet
Ethernet, Ethernet,
Cloud
Cloud,
Speaker
Speaker, speaker,
Microphone
Microphone , microphone ,
Router
Router, router,
ATM Router
ATM Router, ATM router,
ISDN Switch
ISDN Switch , ISDN switch ,
ATM Switch
ATM Switch , ATM switch ,
ATM/FastGB Etherswitch
ATM/FastGB Etherswitch, ATM GB Etherswitch, Fast GB Etherswitch,
Workgroup Switch
Workgroup Switch, workgroup switch,
Small Hub
Small Hub, small hub,
100BaseT Hub
100BaseT Hub , 100BaseT hub,
CDDI-FDDI
CDDI-FDDI , CDDI-FDDI ,
"In computer networking, cloud computing is computing that involves a large number of computers connected through a communication network such as the Internet, similar to utility computing. ...
Network-based services, which appear to be provided by real server hardware, and are in fact served up by virtual hardware, simulated by software running on one or more real machines are often called cloud computing. Such virtual servers do not physically exist and can therefore be moved around and scaled up or down on the fly without affecting the end user, somewhat like a cloud becoming larger or smaller without being a physical object. ...
Typically, the seller has actual energy-consuming servers which host products and services from a remote location, so end-users don't have to; they can simply log on to the network without installing anything. The major models of cloud computing service are known as software as a service, platform as a service, and infrastructure as a service. These cloud services may be offered in a public, private or hybrid network. Google, Amazon,leadsquared.com, Oracle Cloud, Salesforce, Zoho, Access2MyPC, and Microsoft Azure are some well-known cloud vendors." [Cloud computing. Wikipedia]
The AWS architecture diagram example "2-Tier Auto-scalable Web Application Architecture in 1 AZ" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the AWS Architecture Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
AWS architecture diagram
AWS architecture diagram, volume, snapshot, security group, download distribution, bucket, availability zone, auto scaling group, RDS DB instance, Instance, Amazon Route 53,

Network Security Devices

How to describe the necessity of using network security devices and visually illustrate this information? Now, it's very easy thanks to the ConceptDraw DIAGRAM diagramming and vector drawing software extended with Network Security Diagrams Solution from the Computer and Networks Area of ConceptDraw Solution Park.
The vector stencils library "AWS Security, Identity and Compliance" contains 23 Amazon Web Services icons: AWS Directory Service, AWS Config, AWS CloudTrail, AWS Trusted Advisor, Amazon CloudWatch, Alarm. Use it to draw AWS architecture diagrams of your cloud infrastructure services.
"The AWS infrastructure puts strong safeguards in place to help protect customer privacy. All data is stored in highly secure AWS data centers. ...
AWS manages dozens of compliance programs in its infrastructure. This means that segments of your compliance have already been completed. ...
Cut costs by using AWS data centers. Maintain the highest standard of security without having to manage your own facility. ...
Security scales with your AWS cloud usage. No matter the size of your business the AWS infrastructure is designed to keep data safe." [aws.amazon.com/ security/ ]
The symbols example "AWS Security, Identity and Compliance - Vector stencils library" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the AWS Architecture Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
Amazon Inspector
Amazon Inspector, Amazon Inspector,
Agent
Agent, agent,
AWS Artifact
AWS Artifact, AWS Artifact,
AWS Certificate Manager
AWS Certificate Manager, AWS Certificate Manager,
Certificate manager
Certificate manager, certificate manager,
AWS CloudHSM
AWS CloudHSM, AWS CloudHSM,
AWS Directory Service
AWS Directory Service, AWS Directory Service,
AWS IAM
AWS IAM, IAM, AWS Identity and Access Management,
Add-on
Add-on, add-on,
AWS STS
AWS STS, AWS STS,
AWS STS (alternate)
AWS STS (alternate), AWS STS, alternate,
Data encryption key
Data encryption key, data encryption key,
Encrypted data
Encrypted data, encrypted data,
Long-term security credential
Long-term security credential, long-term security credential,
MFA token
MFA token, MFA token,
Permissions
Permissions, permissions,
Role
Role, role,
Temporary security credential
Temporary security credential, temporary security credential,
AWS KMS
AWS KMS, AWS KMS,
AWS Organizations
AWS Organizations, AWS Organizations,
AWS Shield
AWS Shield, AWS Shield,
AWS WAF
AWS WAF, AWS WAF,
Filtering rule
Filtering rule, filtering rule,

Cisco Security. Cisco icons, shapes, stencils and symbols

The ConceptDraw vector stencils library "Cisco Security" contains 16 symbols of security devices and equipment for drawing the computer network diagrams using the ConceptDraw DIAGRAM diagramming and vector drawing software.
This example visual dashboard example shows website traffic metrics. Divided bar chart and pie chart are used to visualize compositional data. Scatter plot is used to visually analyse correlation between two data sets.
"Web traffic is the amount of data sent and received by visitors to a web site. ...
This is determined by the number of visitors and the number of pages they visit. Sites monitor the incoming and outgoing traffic to see which parts or pages of their site are popular and if there are any apparent trends, such as one specific page being viewed mostly by people in a particular country. There are many ways to monitor this traffic and the gathered data is used to help structure sites, highlight security problems or indicate a potential lack of bandwidth not all web traffic is welcome. Some companies offer advertising schemes that, in return for increased web traffic (visitors), pay for screen space on the site. Sites also often aim to increase their web traffic through inclusion on search engines and through search engine optimization." [Web traffic. Wikipedia]
The example "Website traffic dashboard" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the Corellation Dashboard solution from the area "What is a Dashboard" of ConceptDraw Solution Park.
Visual dashboard
Visual dashboard, scatter plot, pie chart, double divided bar, divided bar,

ConceptDraw Solution Park ConceptDraw Solution Park

ConceptDraw Solution Park
ConceptDraw Solution Park collects graphic extensions, examples and learning materials
"Microsoft SharePoint is a Web application platform developed by Microsoft. First launched in 2001, SharePoint has historically been associated with intranet, content management and document management, but recent versions have significantly broader capabilities.
SharePoint comprises a multipurpose set of Web technologies backed by a common technical infrastructure. By default, SharePoint has a Microsoft Office-like interface, and it is closely integrated with the Office suite. The web tools are designed to be usable by non-technical users. SharePoint can be used to provide intranet portals, document & file management, collaboration, social networks, extranets, websites, enterprise search, and business intelligence. It also has system integration, process integration, and workflow automation capabilities.
Enterprise application software (e.g. ERP or CRM packages) often provide some SharePoint integration capability, and SharePoint also incorporates a complete development stack based on web technologies and standards-based APIs. As an application platform, SharePoint provides central management, governance, and security controls for implementation of these requirements. The SharePoint platform integrates directly into IIS - enabling bulk management, scaling, and provisioning of servers, as is often required by large organizations or cloud hosting providers." [Microsoft SharePoint. Wikipedia]
The AWS architecture diagram example "SharePoint server reference architecture for public-facing website scenario" was created using the ConceptDraw PRO diagramming and vector drawing software extended with the AWS Architecture Diagrams solution from the Computer and Networks area of ConceptDraw Solution Park.
AWS architecture diagram
AWS architecture diagram, virtual private cloud, users, server contents, object, internet gateway, instance, generic database, client, availability zone, VPC subnet, Elastic Load Balancing, DB on instance, AWS cloud,

Business diagrams & Org Charts with ConceptDraw DIAGRAM

Business flowcharting tool helps you create a flowchart with minimal effort. With ConceptDraw you can make a flowchart, draw data flow diagrams, orgchart professional, process flow diagrams etc - without any prior knowledge or training.
Draw Business Process Diagrams
Draw Business Process Diagrams