Programs in this category are used to remotely manage a computer, and are not malicious. However, they can be used with malicious intent to take total control of a victim machine.
If a user has installed such a program on his/her computer, or if it was installed by a system administrator, then it does not pose any threat.