SlideShare a Scribd company logo
1 of 2
Download to read offline
© 2015 Synopsys© 2016 Synopsys
Actionable remediation guidance enables developers to quickly address potential security vulnerabilities.
Product Overview
Coverity helps reduce risk and lower overall project cost by identifying critical quality defects and
potential security vulnerabilities during development, with accurate and actionable remediation guidance,
based on patented techniques and a decade of research and development and analysis of over 10
billion lines of proprietary and open source code
Key Features
Depth and Accuracy of Analysis
•	 Coverity integrates seamlessly with any build system and generates a high fidelity representation of
the source code to ensure a deep understanding of its behavior.
•	 Coverity provides full path coverage, ensuring that every line of code and every potential execution
path are tested. It utilizes multiple patented techniques to ensure deep, accurate analysis.
•	 Through a deep understanding of the source code and the underlying frameworks, Coverity platform
provides highly accurate analysis results so developers do not waste time managing large volume of
false positive results. This enables them to effectively build security into the development lifecycle.
Speed and Scale of Analysis
Coverity was built from the ground up to fit into your existing workflow with the following capabilities:
•	 Parallel analysis allows Coverity to run on up to sixteen cores simultaneously and delivers up to a
10X performance improvement over serial analysis.
•	 Incremental analysis enables analysis acceleration by only re-analyzing the code which has
changed or been impacted by a change, instead of the entire codebase each time.
Coverity®
is an accurate and comprehensive static analysis and Static Application Security
Testing (SAST) platform that finds critical defects and security weaknesses in code as it’s
written before they become vulnerabilities, crashes, or maintenance headaches.
ADDRESS SECURITY
AT THE SOURCE
•	 	Arm your developers with the
information they need to troubleshoot
and fix critical defects quickly and
efficiently
•	 Build quality and security into
development to reduce the cost of
rework and delayed time to market
resulting from defects found late in
the cycle
•	 Reduce the risk of costly and
brand-damaging software failures
and security breaches in the field or
in production
Coverity‘s Policy Manager enables
users to easily monitor and report on
status, risks, ans trends.
www.synopsys.com/software
U.S. Sales: (800) 873-8193
International Sales: +1 (415) 321-5237
Email: sales@coverity.com
Synopsys Inc.
185 Berry Street, Suite 6500
San Francisco, CA 94107 USA
© 2016 Synopsys, Inc. All rights reserved. Coverity, the Coverity logo and Coverity SAVE are registered trademarks of Synopsys, Inc. in the U.S. and
other countries. All other company and product names are the property of their respective owners.
•	 Coverity scales to accommodate thousands of developers in geographically
distributed environments and can analyze projects in excess of 100 million lines of
code with ease.
Efficient Issue Management and Remediation
•	 With Coverity Connect, the platform’s collaborative issue management interface,
developers gain access to actionable information and precise remediation guidance,
showing them the right way to fix the defect and the best place in the code to fix it
without requiring deep security domain expertise.
•	 Coverity Connect provides source code navigation to identify the exact path to the
defect and automatically identify every occurrence of the defect across shared code.
•	 Defects can be automatically assigned to the appropriate developer for resolution,
and users can quickly view all outstanding security issues, OWASP Top 10 issues,
CWE, and PCI related issues.
Software Development Lifecycle (SDLC) Integration
•	 Coverity platform allows rapid integration of critical tools and systems used to
support the development process such as source control management, build and
continuous integration, bug tracking, integrated development environments (IDE)
and application lifecycle management (ALM) solutions.
•	 Coverity is an open platform that allows developers to import third party analysis
results into the workflow to view and manage all types of defects in the same way
with a single view of software defects and risks.
Drive Adoption and Mitigate Risk
Coverity Policy Manager enables organizations to define and enforce a consistent
standard for code security as well as quality and testing across development teams.
It provides visibility into which teams, projects or components are compliant with
these standards and can create measurable stage gates based on predefined criteria
regarding defects and testing. The customizable views in Coverity Policy Manager
allows the selection of development metrics and thresholds that align to specific
objectives.
Extend Vulnerability Detection
Coverity Extend is an easy-to-use Software Development Kit (SDK) that allows
developers to detect unique defect types. The SDK is a framework for writing
program analyzers, or checkers, which allows them to identify custom or domain
specific defects. Customized checkers also help enable compliance with corporate
security requirements and industry standards or guidelines.
Coverity is also proud to serve the open source community with
more than 4000 projects currently using our free Coverity Scan,
including inux, Python, PostgreSQL, Firefox, OpenSSL, Perl,
Apache Hadoop, and many more.
Supported Languages
C/C++ C# Java
JavaScript PHP Python
ASP .NET Objective-C JSP
Supported Platforms
Windows Linux Mac OS X Solaris
AIX HP-UX NetBSD FreeBSD
Some Supported Platforms
•	VisualDSP++
•	ARM C/C++
•	Borland C++
•	Clang
•	Cosmic C
•	Freescale
Codewarrior
•	GNU GCC/G++
•	Green Hills C/C++/
EC++
•	HI-TECH PICC
•	HP aCC
•	IAR C/C++
•	IBM XLC
•	Intel C++
•	Keil Compilers
•	Marvell MSA
•	QNX C/C++
•	Renesas C/C++
•	SNC C/C++
•	SNC GNU C/C++
•	STMicroelectronics
GNU C/C++
•	STMicroelectronics
ST Micro C/C++
•	SUN (Oracle) CC
•	Synopsys
Metaware C and
C++ 
•	TI Code Composer
•	Visual Studio
•	Wind River C/++
•	JDK for Mac OS X
•	OpenJDK
•	Sun/Oracle JDK
SDLC Integration
SCM IDE/CI Issue Tracking
•	Accurev
•	Clearcase
•	CVS
•	Git
•	Hg (Mercurial)
•	Perforce
•	SVN
•	Android Studio
•	Eclipse
•	IBM RTC
•	IntelliJ
•	QNX Momentics
•	MS Visual Studio
•	Wind River
Workbench
•	Jenkins
•	TFS
•	JIRA
•	Bugzilla
Critical Checks
API usage errors Integer handling issues
Best practice coding errors Integer overflows
Build system issues Memory – corruptions
Buffer overflows Memory – illegal accesses
Class hierarchy inconsistencies Null pointer dereferences
Code maintainability issues Path manipulation
Concurrent data access violations Performance inefficiencies
Control flow issues Program hangs
Cross-site scripting (XSS) Race conditions
Cross-site request forgery (CSRF) Resource leaks
Deadlocks Rule violations
Error handling issues Security best practices violations
Hard-coded credentials Security misconfigurations
Incorrect expression SQL Injection
Insecure data handling Uninitialized members

More Related Content

What's hot

Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Achim D. Brucker
 
Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud Suman Sourav
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017Suman Sourav
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsSuman Sourav
 
Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009Klocwork
 
Zero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOpsZero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOpsDevSecOps Days
 
Secure development of code
Secure development of codeSecure development of code
Secure development of codeSalomeVictor
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Rogue Wave Software
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Denim Group
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck by Synopsys
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyDerek E. Weeks
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFixVirtual Forge
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...Mohamed Nizzad
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
Scale security for a dollar or less
Scale security for a dollar or lessScale security for a dollar or less
Scale security for a dollar or lessMohammed A. Imran
 
DevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps : The Open Source Way by Yusuf HadiwinataDevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps : The Open Source Way by Yusuf HadiwinataHananto Wibowo Soenarto
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSalil Kumar Subramony
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps SecRubal Jain
 

What's hot (20)

Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...Using Third Party Components for Building an Application Might be More Danger...
Using Third Party Components for Building an Application Might be More Danger...
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud Open Source Libraries - Managing Risk in Cloud
Open Source Libraries - Managing Risk in Cloud
 
DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017DevSecOps-OWASP Indonesia Day 2017
DevSecOps-OWASP Indonesia Day 2017
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009Introducing: Klocwork Insight Pro | November 2009
Introducing: Klocwork Insight Pro | November 2009
 
Zero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOpsZero to Ninety in Securing DevOps
Zero to Ninety in Securing DevOps
 
Secure development of code
Secure development of codeSecure development of code
Secure development of code
 
Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization Shifting the conversation from active interception to proactive neutralization
Shifting the conversation from active interception to proactive neutralization
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
Monitoring Application Attack Surface to Integrate Security into DevOps Pipel...
 
Black Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open SourceBlack Duck & IBM Present: Application Security in the Age of Open Source
Black Duck & IBM Present: Application Security in the Age of Open Source
 
ABN AMRO DevSecOps Journey
ABN AMRO DevSecOps JourneyABN AMRO DevSecOps Journey
ABN AMRO DevSecOps Journey
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
DevSecops: Defined, tools, characteristics, tools, frameworks, benefits and c...
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Scale security for a dollar or less
Scale security for a dollar or lessScale security for a dollar or less
Scale security for a dollar or less
 
DevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps : The Open Source Way by Yusuf HadiwinataDevSecOps : The Open Source Way by Yusuf Hadiwinata
DevSecOps : The Open Source Way by Yusuf Hadiwinata
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
DevSecOps | DevOps Sec
DevSecOps | DevOps SecDevSecOps | DevOps Sec
DevSecOps | DevOps Sec
 

Similar to Coverity Data Sheet

Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Perforce
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycleEnov8
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldRogue Wave Software
 
Let's banish "it works on my machine"
Let's banish "it works on my machine"Let's banish "it works on my machine"
Let's banish "it works on my machine"Stephanie Locke
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowAmien Harisen Rosyandino
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineDevOps.com
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with SparrowJason Sohn
 
[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise EditionITAS VIETNAM
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareRogue Wave Software
 
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptxDoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptxTomGrand4
 
What is SonarQube in DevOps.docx
What is SonarQube in DevOps.docxWhat is SonarQube in DevOps.docx
What is SonarQube in DevOps.docxDevOps University
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdfAklnt
 
How Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisCheckmarx
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015John Haggins
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security Rogue Wave Software
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssistBryan Ferrario
 
Open source iam value, benefits, and risks
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risksWSO2
 

Similar to Coverity Data Sheet (20)

Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle4 approaches to integrate dev secops in development cycle
4 approaches to integrate dev secops in development cycle
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
Let's banish "it works on my machine"
Let's banish "it works on my machine"Let's banish "it works on my machine"
Let's banish "it works on my machine"
 
Pentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrowPentest is yesterday, DevSecOps is tomorrow
Pentest is yesterday, DevSecOps is tomorrow
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Build Security into the Software with Sparrow
Build Security into the Software with SparrowBuild Security into the Software with Sparrow
Build Security into the Software with Sparrow
 
[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition[ITAS.VN]CxSuite Enterprise Edition
[ITAS.VN]CxSuite Enterprise Edition
 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
 
Top 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle softwareTop 5 best practice for delivering secure in-vehicle software
Top 5 best practice for delivering secure in-vehicle software
 
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptxDoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
DoD-Enterprise-DevSecOps-Initiative-Introduction-v4.52.pptx
 
What is SonarQube in DevOps.docx
What is SonarQube in DevOps.docxWhat is SonarQube in DevOps.docx
What is SonarQube in DevOps.docx
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
SIG-product-overview.pdf
SIG-product-overview.pdfSIG-product-overview.pdf
SIG-product-overview.pdf
 
How Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code AnalysisHow Virtual Compilation Transforms Static Code Analysis
How Virtual Compilation Transforms Static Code Analysis
 
John Haggins Res2015
John Haggins Res2015John Haggins Res2015
John Haggins Res2015
 
Create code confidence for better application security
Create code confidence for better application security Create code confidence for better application security
Create code confidence for better application security
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
Open source iam value, benefits, and risks
Open source iam  value, benefits, and risksOpen source iam  value, benefits, and risks
Open source iam value, benefits, and risks
 

Coverity Data Sheet

  • 1. © 2015 Synopsys© 2016 Synopsys Actionable remediation guidance enables developers to quickly address potential security vulnerabilities. Product Overview Coverity helps reduce risk and lower overall project cost by identifying critical quality defects and potential security vulnerabilities during development, with accurate and actionable remediation guidance, based on patented techniques and a decade of research and development and analysis of over 10 billion lines of proprietary and open source code Key Features Depth and Accuracy of Analysis • Coverity integrates seamlessly with any build system and generates a high fidelity representation of the source code to ensure a deep understanding of its behavior. • Coverity provides full path coverage, ensuring that every line of code and every potential execution path are tested. It utilizes multiple patented techniques to ensure deep, accurate analysis. • Through a deep understanding of the source code and the underlying frameworks, Coverity platform provides highly accurate analysis results so developers do not waste time managing large volume of false positive results. This enables them to effectively build security into the development lifecycle. Speed and Scale of Analysis Coverity was built from the ground up to fit into your existing workflow with the following capabilities: • Parallel analysis allows Coverity to run on up to sixteen cores simultaneously and delivers up to a 10X performance improvement over serial analysis. • Incremental analysis enables analysis acceleration by only re-analyzing the code which has changed or been impacted by a change, instead of the entire codebase each time. Coverity® is an accurate and comprehensive static analysis and Static Application Security Testing (SAST) platform that finds critical defects and security weaknesses in code as it’s written before they become vulnerabilities, crashes, or maintenance headaches. ADDRESS SECURITY AT THE SOURCE • Arm your developers with the information they need to troubleshoot and fix critical defects quickly and efficiently • Build quality and security into development to reduce the cost of rework and delayed time to market resulting from defects found late in the cycle • Reduce the risk of costly and brand-damaging software failures and security breaches in the field or in production Coverity‘s Policy Manager enables users to easily monitor and report on status, risks, ans trends.
  • 2. www.synopsys.com/software U.S. Sales: (800) 873-8193 International Sales: +1 (415) 321-5237 Email: sales@coverity.com Synopsys Inc. 185 Berry Street, Suite 6500 San Francisco, CA 94107 USA © 2016 Synopsys, Inc. All rights reserved. Coverity, the Coverity logo and Coverity SAVE are registered trademarks of Synopsys, Inc. in the U.S. and other countries. All other company and product names are the property of their respective owners. • Coverity scales to accommodate thousands of developers in geographically distributed environments and can analyze projects in excess of 100 million lines of code with ease. Efficient Issue Management and Remediation • With Coverity Connect, the platform’s collaborative issue management interface, developers gain access to actionable information and precise remediation guidance, showing them the right way to fix the defect and the best place in the code to fix it without requiring deep security domain expertise. • Coverity Connect provides source code navigation to identify the exact path to the defect and automatically identify every occurrence of the defect across shared code. • Defects can be automatically assigned to the appropriate developer for resolution, and users can quickly view all outstanding security issues, OWASP Top 10 issues, CWE, and PCI related issues. Software Development Lifecycle (SDLC) Integration • Coverity platform allows rapid integration of critical tools and systems used to support the development process such as source control management, build and continuous integration, bug tracking, integrated development environments (IDE) and application lifecycle management (ALM) solutions. • Coverity is an open platform that allows developers to import third party analysis results into the workflow to view and manage all types of defects in the same way with a single view of software defects and risks. Drive Adoption and Mitigate Risk Coverity Policy Manager enables organizations to define and enforce a consistent standard for code security as well as quality and testing across development teams. It provides visibility into which teams, projects or components are compliant with these standards and can create measurable stage gates based on predefined criteria regarding defects and testing. The customizable views in Coverity Policy Manager allows the selection of development metrics and thresholds that align to specific objectives. Extend Vulnerability Detection Coverity Extend is an easy-to-use Software Development Kit (SDK) that allows developers to detect unique defect types. The SDK is a framework for writing program analyzers, or checkers, which allows them to identify custom or domain specific defects. Customized checkers also help enable compliance with corporate security requirements and industry standards or guidelines. Coverity is also proud to serve the open source community with more than 4000 projects currently using our free Coverity Scan, including inux, Python, PostgreSQL, Firefox, OpenSSL, Perl, Apache Hadoop, and many more. Supported Languages C/C++ C# Java JavaScript PHP Python ASP .NET Objective-C JSP Supported Platforms Windows Linux Mac OS X Solaris AIX HP-UX NetBSD FreeBSD Some Supported Platforms • VisualDSP++ • ARM C/C++ • Borland C++ • Clang • Cosmic C • Freescale Codewarrior • GNU GCC/G++ • Green Hills C/C++/ EC++ • HI-TECH PICC • HP aCC • IAR C/C++ • IBM XLC • Intel C++ • Keil Compilers • Marvell MSA • QNX C/C++ • Renesas C/C++ • SNC C/C++ • SNC GNU C/C++ • STMicroelectronics GNU C/C++ • STMicroelectronics ST Micro C/C++ • SUN (Oracle) CC • Synopsys Metaware C and C++  • TI Code Composer • Visual Studio • Wind River C/++ • JDK for Mac OS X • OpenJDK • Sun/Oracle JDK SDLC Integration SCM IDE/CI Issue Tracking • Accurev • Clearcase • CVS • Git • Hg (Mercurial) • Perforce • SVN • Android Studio • Eclipse • IBM RTC • IntelliJ • QNX Momentics • MS Visual Studio • Wind River Workbench • Jenkins • TFS • JIRA • Bugzilla Critical Checks API usage errors Integer handling issues Best practice coding errors Integer overflows Build system issues Memory – corruptions Buffer overflows Memory – illegal accesses Class hierarchy inconsistencies Null pointer dereferences Code maintainability issues Path manipulation Concurrent data access violations Performance inefficiencies Control flow issues Program hangs Cross-site scripting (XSS) Race conditions Cross-site request forgery (CSRF) Resource leaks Deadlocks Rule violations Error handling issues Security best practices violations Hard-coded credentials Security misconfigurations Incorrect expression SQL Injection Insecure data handling Uninitialized members