Risk
2/15/2013
11:27 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Coverity Expands Global Footprint

Announces the opening of four new offices

SAN FRANCISCO, Feb. 13, 2013 /PRNewswire/ -- Coverity, Inc., the leader in development testing, today announced the opening of four new offices, as well as the expansion of three existing offices, across Asia, Europe and North America.

The company cited the rising worldwide demand for development testing across all industries as the reason for its expansion.

To increase its customer support in two of the fastest growing economies in the world, Coverity opened new offices in Bangalore, India, and Beijing, China. The company also opened a new C# Center of Excellence in Seattle, led by veteran Microsoft developer Eric Lippert, and a new field office in Paris. In addition, Coverity is expanding its existing footprint with increased office space in London, Boston and Calgary, Canada, and increased personnel in Munich, New York and Toronto.

"The world is increasingly becoming software-driven, and companies can no longer ignore the business impact that a software failure or security breach can have on their brands or on their bottom lines," said Anthony Bettencourt, CEO for Coverity. "Coverity is committed to the continued success of our 1,100+ customers with a platform that integrates quality and security testing seamlessly into their respective development processes. With the new offices, we'll be able to better support our customers in these key regions and continue on our path of rapid growth and new customer acquisition."

Founded in 2003, Coverity has grown from its roots as a project born in the Computer Systems Laboratory at Stanford University to a global enterprise with more than 275 employees, based in 11 offices that span ten countries and three continents.

About Coverity

Coverity, Inc., (www.coverity.com), the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use Coverity's development testing platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco. Coverity is funded by Foundation Capital and Benchmark Capital. Follow us on Twitter or check out our blog.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3154
Published: 2014-04-17
DistUpgrade/DistUpgradeViewKDE.py in Update Manager before 1:0.87.31.1, 1:0.134.x before 1:0.134.11.1, 1:0.142.x before 1:0.142.23.1, 1:0.150.x before 1:0.150.5.1, and 1:0.152.x before 1:0.152.25.5 does not properly create temporary files, which allows local users to obtain the XAUTHORITY file conte...

CVE-2013-2143
Published: 2014-04-17
The users controller in Katello 1.5.0-14 and earlier, and Red Hat Satellite, does not check authorization for the update_roles action, which allows remote authenticated users to gain privileges by setting a user account to an administrator account.

CVE-2014-0036
Published: 2014-04-17
The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification disabled, which allows remote attackers to conduct man-in-the-middle attacks via unspecified vectors.

CVE-2014-0054
Published: 2014-04-17
The Jaxb2RootElementHttpMessageConverter in Spring MVC in Spring Framework before 3.2.8 and 4.0.0 before 4.0.2 does not disable external entity resolution, which allows remote attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via crafted XML, aka an XML External ...

CVE-2014-0071
Published: 2014-04-17
PackStack in Red Hat OpenStack 4.0 does not enforce the default security groups when deployed to Neutron, which allows remote attackers to bypass intended access restrictions and make unauthorized connections.

Best of the Web