There are Adobe Flash alternatives , as there are alternatives for reading PDF files with applications other than...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Adobe Reader, but there are downsides. Enterprises will need to compare the effort and associated overhead involved in transitioning to an alternative Flash player to the overhead involved in securing desktops and ensuring Flash-based malware doesn't affect key systems.
From an application development standpoint , there are a couple alternatives to Flash, such as HTML5, Adobe AIR, Microsoft Silverlight and Java applets; there is also a stalled open source project called UIRA that was being developed as a Flash replacement. While there have been potential security threats in HTML5, it may be a better long-term option than Flash, since its technology will be included directly in the browser and the security will be evaluated along with the browser. One of the benefits of Flash, however, is that its security threats are better known than the threats to its competitors, therefore making its vulnerabilities more likely to be patched in a timely manner.
In any case, enterprises will need to understand how Flash is used in their environments prior to implementing an alternative, both by end users and in application and website development, since Flash has become more than just a basic way to display a multimedia webpage and has evolved to support full Flash-based applications.
Dig Deeper on Securing Productivity Applications
Related Q&A from Nick Lewis
Locky ransomware has borrowed features from Dridex malware, which focused on attacking banks. Expert Nick Lewis explains Locky's techniques and how ...continue reading
The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks ...continue reading
MouseJack, a wireless mouse and keyboard security flaw, allows attackers to type malicious commands. Expert Nick Lewis explains how enterprises can ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.