Synopsys coverity static analysis tool features enhanced security
Synopsys has announced version 8.7 of its Coverity static analysis tool with enhanced security analysis for mobile and web applications. Along with the recent acquisitions of Cigital and Codiscope, the latest version of the Coverity tool will provide Synopsys customers with the enterprise-level security analysis and broad programming language support necessary to address today’s evolving application security demands.
“Mobile and web applications are used widely across organizations to conduct business and process sensitive information, so addressing critical security vulnerabilities before they cause disruption for employees or customers is essential,” said Andreas Kuehlmann, Senior Vice President and general manager of Synopsys’ Software Integrity Group. “Given the rapid pace and scale of software development efforts today, detecting security flaws early in the development process with a highly accurate tool such as Coverity creates efficiencies that benefit all stakeholders.”
Mobile application security testing
A core component of the Synopsys Software Integrity Platform, the Coverity automated software testing tool analyzes source code to detect critical security vulnerabilities and defects early in the software development lifecycle. Coverity 8.7 includes major enhancements to the tool’s security analysis for Android applications, helping customers detect the most critical vulnerabilities and weaknesses on the OWASP Top 10.
Web application security testing
Secure software development lifecycle integration
About the Synopsys software integrity platform
Through its Software Integrity Platform, Synopsys provides advanced solutions for improving software security and quality. This comprehensive platform of automated analysis and testing technologies integrates seamlessly into the software development process and enables organizations to detect and remediate quality defects, security vulnerabilities and compliance issues early in the software development lifecycle, as well as to gain security assurance with and visibility into their software supply chain.
Comments are closed, but trackbacks and pingbacks are open.