Risk
2/15/2013
11:27 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Coverity Expands Global Footprint

Announces the opening of four new offices

SAN FRANCISCO, Feb. 13, 2013 /PRNewswire/ -- Coverity, Inc., the leader in development testing, today announced the opening of four new offices, as well as the expansion of three existing offices, across Asia, Europe and North America.

The company cited the rising worldwide demand for development testing across all industries as the reason for its expansion.

To increase its customer support in two of the fastest growing economies in the world, Coverity opened new offices in Bangalore, India, and Beijing, China. The company also opened a new C# Center of Excellence in Seattle, led by veteran Microsoft developer Eric Lippert, and a new field office in Paris. In addition, Coverity is expanding its existing footprint with increased office space in London, Boston and Calgary, Canada, and increased personnel in Munich, New York and Toronto.

"The world is increasingly becoming software-driven, and companies can no longer ignore the business impact that a software failure or security breach can have on their brands or on their bottom lines," said Anthony Bettencourt, CEO for Coverity. "Coverity is committed to the continued success of our 1,100+ customers with a platform that integrates quality and security testing seamlessly into their respective development processes. With the new offices, we'll be able to better support our customers in these key regions and continue on our path of rapid growth and new customer acquisition."

Founded in 2003, Coverity has grown from its roots as a project born in the Computer Systems Laboratory at Stanford University to a global enterprise with more than 275 employees, based in 11 offices that span ten countries and three continents.

About Coverity

Coverity, Inc., (www.coverity.com), the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use Coverity's development testing platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco. Coverity is funded by Foundation Capital and Benchmark Capital. Follow us on Twitter or check out our blog.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web