Risk
5/15/2013
05:54 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Coverity Reports More Than 30 Percent Year-Over-Year Growth For H1 2013

Announced its financial results for the first half of fiscal year 2013

SAN FRANCISCO, May 15, 2013 /PRNewswire/ -- Coverity, Inc., the leader in development testing, today announced its financial results for the first half of fiscal year 2013. The company experienced more than a 30% increase in revenue compared to the first half of fiscal year 2012, and added more than 80 new customer accounts in the first half of fiscal year 2013, as a result of rapid industry adoption of development testing.

"Our growth over the past two quarters is indicative of the fact that every company - be it a new startup or a 100 year-old Fortune 500 company - is becoming a software company to some degree," said Anthony Bettencourt, chairman and chief executive officer for Coverity. "Development testing is no longer a 'nice to have' for these companies, but an accepted organizational best practice to ensure reliable, high-quality, secure software code. Companies that don't adopt development testing will face a competitive disadvantage as they race to launch and support their software-enabled innovations."

Key growth drivers for Coverity include:

-- Rapid Adoption within Java Development Teams: As the need for

high-quality, secure Java applications continues to grow, organizations

from all industries - from financial services and e-commerce to mobile

and networking - are requiring enterprise-class development testing

solutions to manage both software quality and security. The company also

expanded its free Coverity Scan(TM) service to support the growing

number of open source Java projects and has begun working with Hudson

Server, Eclipse Code Recommender and Apache Cassandra, among others.

-- Growing Importance of Addressing Security in Development: The company's

Security Research Laboratory published the first release of its software

development research, Fixing XSS: A Practical Guide for Developers, and

launched the Coverity Security Library, an open source project available

through GitHub, which enables developers to quickly remediate cross-site

scripting defects in Java web applications. Coverity also joined the

Financial Services Information Sharing and Analysis Center (FS-ISAC) to

further promote development testing practices among the nation's leading

banking, finance and security firms, and to help protect the U.S.

financial services sector critical infrastructure from security threats.

-- Proliferation of Open Source: The company released its fifth annual

Coverity Scan Open Source Report, which has become a widely accepted

standard for measuring the state of open source software quality. Today,

the Coverity Scan service supports more than 250 active projects, with

more than 600 active developers. Coverity also joined the Eclipse

Foundation and now offers a Hudson plugin that integrates with projects

hosted by the Eclipse Foundation, enabling them to access the Scan

service in their development workflow.

-- Product Innovation: The company released version 6.5 of the Coverity®

Development Testing Platform, including Coverity Security Advisor and

Coverity Test Advisor. These innovations empower developers to address

security issues while code is being written and understand the impact of

code changes, enabling them to focus unit testing time and resources on

the most critical parts of the code. Coverity Security Advisor was a

finalist for the SIIA Software CODiE award for best security solution

and for the SC Awards Europe for security innovation. Coverity was also

named a Deloitte "Technology Fast 500" company.

About Coverity

Coverity, Inc., (www.coverity.com), the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use Coverity's development testing platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco. Coverity is funded by Foundation Capital and Benchmark Capital. Follow us on Twitter or check out our blog.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?