There are Adobe Flash alternatives , as there are alternatives for reading PDF files with applications other than...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Adobe Reader, but there are downsides. Enterprises will need to compare the effort and associated overhead involved in transitioning to an alternative Flash player to the overhead involved in securing desktops and ensuring Flash-based malware doesn't affect key systems.
From an application development standpoint , there are a couple alternatives to Flash, such as HTML5, Adobe AIR, Microsoft Silverlight and Java applets; there is also a stalled open source project called UIRA that was being developed as a Flash replacement. While there have been potential security threats in HTML5, it may be a better long-term option than Flash, since its technology will be included directly in the browser and the security will be evaluated along with the browser. One of the benefits of Flash, however, is that its security threats are better known than the threats to its competitors, therefore making its vulnerabilities more likely to be patched in a timely manner.
In any case, enterprises will need to understand how Flash is used in their environments prior to implementing an alternative, both by end users and in application and website development, since Flash has become more than just a basic way to display a multimedia webpage and has evolved to support full Flash-based applications.
Dig Deeper on Productivity apps and messaging security
Related Q&A from Nick Lewis
When NSA cyberweapons went public, attackers bundled them into the EternalRocks malware. Nick Lewis takes a closer look at this new threat and ...continue reading
A Google Docs phishing attack used OAuth tokens to affect more than a million Gmail users. Nick Lewis explains how it happened, and how to defend ...continue reading
A vulnerability in Microsoft's Windows Defender antivirus tool left users open to remote code exploitation. Expert Nick Lewis explains how it ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.