There are Adobe Flash alternatives , as there are alternatives for reading PDF files with applications other than...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Adobe Reader, but there are downsides. Enterprises will need to compare the effort and associated overhead involved in transitioning to an alternative Flash player to the overhead involved in securing desktops and ensuring Flash-based malware doesn't affect key systems.
From an application development standpoint , there are a couple alternatives to Flash, such as HTML5, Adobe AIR, Microsoft Silverlight and Java applets; there is also a stalled open source project called UIRA that was being developed as a Flash replacement. While there have been potential security threats in HTML5, it may be a better long-term option than Flash, since its technology will be included directly in the browser and the security will be evaluated along with the browser. One of the benefits of Flash, however, is that its security threats are better known than the threats to its competitors, therefore making its vulnerabilities more likely to be patched in a timely manner.
In any case, enterprises will need to understand how Flash is used in their environments prior to implementing an alternative, both by end users and in application and website development, since Flash has become more than just a basic way to display a multimedia webpage and has evolved to support full Flash-based applications.
Dig Deeper on Productivity apps and messaging security
Related Q&A from Nick Lewis
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks ...continue reading
How was the ATMitch malware able to loot cash machines, then delete itself? Expert Nick Lewis explains how the fileless malware works and how it ...continue reading
DoubleAgent malware is a proof of concept for a zero-day vulnerability that can turn antivirus tools into attack vectors. Expert Nick Lewis explains ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.