There are Adobe Flash alternatives , as there are alternatives for reading PDF files with applications other than...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Adobe Reader, but there are downsides. Enterprises will need to compare the effort and associated overhead involved in transitioning to an alternative Flash player to the overhead involved in securing desktops and ensuring Flash-based malware doesn't affect key systems.
From an application development standpoint , there are a couple alternatives to Flash, such as HTML5, Adobe AIR, Microsoft Silverlight and Java applets; there is also a stalled open source project called UIRA that was being developed as a Flash replacement. While there have been potential security threats in HTML5, it may be a better long-term option than Flash, since its technology will be included directly in the browser and the security will be evaluated along with the browser. One of the benefits of Flash, however, is that its security threats are better known than the threats to its competitors, therefore making its vulnerabilities more likely to be patched in a timely manner.
In any case, enterprises will need to understand how Flash is used in their environments prior to implementing an alternative, both by end users and in application and website development, since Flash has become more than just a basic way to display a multimedia webpage and has evolved to support full Flash-based applications.
Dig Deeper on Securing Productivity Applications
Related Q&A from Nick Lewis
SSL attacks "in stealth mode" are helping attackers avoid detection and analysis. Expert Nick Lewis explains how to discover and defend against the ...continue reading
Learn how sinkholing is helping security experts analyze infected devices and even disable malware in compromised endpoints.continue reading
Motion and gestures are being used for mobile malware detection on smartphones. Learn how this method works and whether it is a worthy addition to an...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.