Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Fortify Software

From Wikipedia, the free encyclopedia
American software company
Fortify
Company typeSoftware Vendor
IndustryComputer software
GenreSoftware Security Assurance
Founded2003
FounderTed Schlein ofKleiner, Perkins, Caufield & Byers, Mike Armistead, Brian Chess, Arthur Do, Roger Thornton
Headquarters,
United States
Key people
John M. Jack(formerCEO), Jacob West(head of Security Research Group), Brian Chess(former Chief Scientist), Arthur Do(former Chief Architect)
OwnerOpenText
WebsiteOpenText
OpenText Cybersecurity Cloud

Fortify Software, later known asFortify Inc., is aCalifornia-based software security vendor, founded in 2003 and acquired byHewlett-Packard in 2010,[1][2][3]Micro Focus in 2017, andOpenText in 2023.

Fortify offerings includedstatic application security testing[4] anddynamic application security testing[5] products, as well as products and services that supportsoftware security assurance. In 2011, Fortify introducedFortify OnDemand, a static and dynamic application testing service.[6]

History

[edit]

Fortify Software was founded byKleiner Perkins in 2003. Fortify Inc. was acquired by HP in 2010.[7]

On September 7, 2016, HPE CEOMeg Whitman announced that the software assets of Hewlett Packard Enterprise, including Fortify, would be merged withMicro Focus to create an independent company of which HP Enterprise shareholders would retain majority ownership.[citation needed]

Micro Focus CEO Kevin Loosemore called the transaction "entirely consistent with our established acquisition strategy and our focus on efficient management of mature infrastructure products" and indicated that Micro Focus intended to "bring the core earnings margin for the mature assets in the deal - about 80 percent of the total - from 21 percent today to Micro Focus's existing 46 percent level within three years."[8]

OpenText acquired Micro Focus (including Fortify Software products) in 2023.[9]

Security research

[edit]

Fortify created a security research group that maintained the Java Open Review project[10] and the Vulncat taxonomy of security vulnerabilities in addition to the security rules for Fortify's analysis software.[11] Members of the group wrote the bookSecure Coding with Static Analysis, and published research, includingJavaScript Hijacking,[12]Attacking the build: Cross build Injection,[13]Watch what you write: Preventing Cross-site scripting by observing program output,[14] andDynamic taint propagation: Finding vulnerabilities without attacking.[15]

See also

[edit]

References

[edit]
  1. ^"HP Completes Acquisition of Fortify Software, Accelerating Security Across the Application Life Cycle". September 22, 2010. RetrievedDecember 17, 2018.
  2. ^Roberts, Paul (April 5, 2004)."Software Searches for Security Flaws".PCWorld.com. Archived fromthe original on December 19, 2020. RetrievedDecember 17, 2018.
  3. ^Wagner, Jim (April 5, 2004)."A New Approach to Fortify Your Software".Internetnews.com. RetrievedDecember 17, 2018.
  4. ^"HP Fortify Static Code Analyzer". RetrievedDecember 17, 2018.
  5. ^"HP Unveils Real-Time Application Security Testing Tool".DarkReading.com. July 14, 2011. RetrievedDecember 17, 2018.
  6. ^Reitano, Victoria (February 15, 2011)."HP builds up its Security-as-a-Service".SD Times. RetrievedDecember 17, 2018.
  7. ^"HP's Fortify Buyout Numbers Tell Lucrative Story For Software Security".Forbes. August 18, 2010. RetrievedMay 4, 2020.
  8. ^Sandle, Paul; Baker, Liana B. (September 7, 2016)."HP Enterprise strikes $8.8 billion deal with Micro Focus for software assets".Reuters. RetrievedDecember 17, 2018.
  9. ^OpenText, Sponsored by (2023-05-09)."Fortified by multiple acquisitions, OpenText aims to deliver smarter, simpler security".SC Media. Retrieved2025-07-29.
  10. ^"Quality and Security for Open source Community". Archived fromthe original on December 16, 2006. RetrievedDecember 17, 2018.
  11. ^"HP Fortify Taxonomy: Software Security Errors". Archived fromthe original on November 27, 2012. RetrievedDecember 17, 2018.
  12. ^Chess, Brian; O'Neil, Yekaterina Tsipenyuk; West, Jacob (March 12, 2007)."JavaScript Hijacking"(PDF). RetrievedDecember 17, 2018.
  13. ^Chess, Brian; Lee, Fredrick DeQuan; West, Jacob (October 10, 2007)."Attacking the Build through Cross-Build Injection". RetrievedDecember 17, 2018.
  14. ^Madou, Matias; Lee, Edward; West, Jacob; Chess, Brian (2008)."Watch What You Write: Preventing Cross-Site Scripting by Observing Program Output"(PDF). RetrievedDecember 17, 2018.
  15. ^Chess, Brian; West, Jacob (January 2008)."Dynamic taint propagation: Finding vulnerabilities without attacking".Information Security Tech.13 (1):33–39.doi:10.1016/j.istr.2008.02.003. RetrievedDecember 17, 2018.

External links

[edit]
Founders
Products
Acquisitions
Products
Personal
computers
Desktops
Laptops
Workstations
and servers
Mobile devices
Printing
and imaging
Microprocessors
Computer buses
Other hardware
Services
CEOs
Assets
Acquisitions
Spin-offs
Related
  • Asterisk (*) denotes product lines continued byHP Inc.
  • Double asterisk (**) denotes product lines and companies now property ofHewlett Packard Enterprise
  • Dagger (†) denotes assets or companies divested and sold off
Retrieved from "https://en.wikipedia.org/w/index.php?title=Fortify_Software&oldid=1332721438"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp