We are using GK and the latest version for port deployment.
Software Developer at Altair
Scalable, good for cluster structures, and has helpful technical support
Pros and Cons
- "Coverity is scalable."
- "Coverity is not stable."
What is our primary use case?
For how long have I used the solution?
I have been using Coverity for three and a half years.
What do I think about the stability of the solution?
Coverity is not stable but it is sufficient for our organization's requirements.
What do I think about the scalability of the solution?
Coverity is scalable.
Buyer's Guide
Coverity Static
October 2025

Learn what your peers think about Coverity Static. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.
How are customer service and support?
We contacted technical support to help us clean up an issue we had.
What other advice do I have?
If they have a cluster structure, then definitely they should use Coverity. I would rate Coverity a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Sr. QA Engineer at a computer software company with 1-10 employees
Good tech support but it doesn't report errors like it should
Pros and Cons
- "I encountered a bug with Coverity, and I opened a ticket. Support provided me with a workaround. So it's working at the moment, or at least it seems to be."
- "Coverity is far from perfection, and I'm not 100 percent sure it's helping me find what I need to find in my role. We need exactly what we are looking for, i.e. security errors and vulnerabilities. It doesn't seem to be reporting while we are changing our code."
What is our primary use case?
We use Coverity for static analysis of our code.
What needs improvement?
Coverity is far from perfection, and I'm not 100 percent sure it's helping me find what I need to find in my role. We need exactly what we are looking for, i.e. security errors and vulnerabilities. It doesn't seem to be reporting while we are changing our code. So either we are perfect, or the tool is missing something. 
For how long have I used the solution?
I've been using Coverity for a couple of years.
What do I think about the scalability of the solution?
I haven't had much experience trying to scale up Coverity. Only three people at our company work with it.
How are customer service and support?
I encountered a bug with Coverity, and I opened a ticket. Support provided me with a workaround. So it's working at the moment, or at least it seems to be. They are on par with other tech support in terms of knowledge. However, their style of communication could use some improvement.
How was the initial setup?
Setting up Coverity is highly complex. The upgrade procedure is also pretty tough. We've had trouble with it on at least one occasion. When I went ahead with it, it destroyed the installation. I couldn't go back. So it's challenging to understand from the documentation. It seems like they tried to cover all possible topics in their manuals, so they ended up scratching the surface of everything in the world except for the particular practical items that I needed.
What's my experience with pricing, setup cost, and licensing?
Coverity is very expensive.
What other advice do I have?
I rate Coverity five out of 10, but it's tough for me to judge because we decided to purchase it based on one requirement that no other static analysis tool could satisfy. For that reason, we haven't tried anything else. So, let's make an analogy. Let's say I used Sony TVs my entire life, and someone comes up and says, "Hey, there is a new brand of TVs. What do you think of them? Do you think they are good?" How would I know? By comparison, SonarQube seems to be more feature-rich for a standard programming language, and it works with more continuous integration tools.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Coverity Static
October 2025

Learn what your peers think about Coverity Static. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,778 professionals have used our research since 2012.
Director at a manufacturing company with 10,001+ employees
Stable, scalable, and provides reports about a lot of potential defects
Pros and Cons
- "It provides reports about a lot of potential defects."
- "Its price can be improved. Price is always an issue with Synopsys."
What is our primary use case?
We use it in our company during product development.
What is most valuable?
It provides reports about a lot of potential defects.
What needs improvement?
Its price can be improved. Price is always an issue with Synopsys.
For how long have I used the solution?
I have been using Coverity for about three or four years.
What do I think about the stability of the solution?
It has good stability.
What do I think about the scalability of the solution?
Its scalability is good.
How are customer service and technical support?
They are professional and very responsible. They have a local FAE.
How was the initial setup?
It is not straightforward, but it is also not too complex. The learning curve needed for installing Coverity is okay.
What's my experience with pricing, setup cost, and licensing?
It is expensive.
What other advice do I have?
I would recommend this solution if you can afford it. If you have enough budget, it is one of the best solutions right now. There may be other cheaper solutions, but you get what you pay for.
We have been using Coverity for several years. We would not have continued using it if it was not a good solution. We always have some minor questions or improvements for them, and they always give us a relatively fast response.
I would rate Coverity a nine out of ten. Only its price should be improved.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Consultant at a tech services company with 11-50 employees
Straightforward to install and reports few false positives, but it should be easier to specify your own validation and sanitation routines
Pros and Cons
- "The most valuable feature is that there were not a whole lot of false positives, at least on the codebases that I looked at."
- "It should be easier to specify your own validation routines and sanitation routines."
What is our primary use case?
I am a consultant and I work to bring solutions to different companies. Static code analysis is one of the things that I assist people with, and Coverity is one of the tools that I use for doing that.
I worked with Coverity when doing a couple of different PoCs. For these, I get a few different teams of developers together and we want to decide what makes the most sense for each team as far as scanning technologies. So, part of that is what languages are supported, part of that is how extensible it is, and part of that extensibility is do the developers have time to actually create custom roles?
We also want to know things like what the professional are services like, and do people typically need many hours of professional services to get the system spun up. Other factors include whether it deployed on-premises or in the cloud, and also, which of those environments it can operate with.
One of the things is there's not really a shining star out of all of these tools. SaaS tools have been getting more mature in the past decade, particularly in how fast they run, but also in the results they get. Of course, framework and language additions that increase the capability with results are considered.
What is most valuable?
The most valuable feature is that there were not a whole lot of false positives, at least on the codebases that I looked at.
What needs improvement?
It should be easier to specify your own validation routines and sanitation routines.
For example, if you have data coming into the application, perhaps something really simple like it's getting a parameter from a web page that is your username when you go to a website to login, and then ultimately that's being consumed by something, the data goes through some business logic and then, let's say, it enters that username into a database.
Well, what if I say my username is JavaScript calling alert hello. Now I've just entered JavaScript code as my username and you should be able to sanitize that pretty easily with a number of different techniques to remove the actual executable code from what they entered on the login page. However, once you do that, you want the program to understand that you are doing it and then remove what looks like a true positive at first glance because, in fact, the data being consumed in the SQL exec statement is not unsanitized. It's not just coming from the web.
Likewise, let's say you log in, and then it says, "Hello" Such and such. You can inject JavaScript code there and have it be executed when it says hello. So basically the ability to say that this validates and then also above and beyond that, this validates data coming from any GET parameter on the web. You should be able to specify a particular routine validates all of that, or this particular routine validates anytime we read data from a database, maybe an untrusted database.
So, if I reach for that data eight times and I say, "Hey," this validates it once, I also get the option to say it validates it the other seven times, or I could just say it's a universal validator. Obviously, a God validator so to speak is not a good practice because you're sure to miss some edge cases, but to have one routine validate three or four different occurrences is not rare and is often not a bad practice.
Another thing that Coverity needs to implement or improve is a graphical way to display the data. If you can see an actual graphical view of the data coming in, then it would be very useful. Let's say, the first node would be GET parameter from a webpage, and then it would be an arrow to another method like validate user ID, and then another method of GET data about the user. Next, that goes into the database, and so forth. When that's graphically displayed, then it is helpful for developers because they can better grab onto it.
The speed of Coverity can be improved, although that is true for any similar product.
What do I think about the stability of the solution?
It never crashed so stability has not been an issue.
What do I think about the scalability of the solution?
I have never used it for more than four relatively small to medium-sized projects at a time, so I've never needed to scale it.
How are customer service and technical support?
I have dealt with sales engineering, rather than technical support. They would sometimes provide a liaison to tech support if they didn't know the answer, but really, they guided us through the proof of concept and they knew that they were under a competitive evaluation against the other tools. They were able to resolve any issues that we came across and got us up and running fairly quickly, as far as I recall.
How was the initial setup?
Coverity is on the good side when it comes to setting it up. I think that it is pretty straightforward to get up and running.
What about the implementation team?
We implement Coverity on our own, with guidance from Coverity.
What's my experience with pricing, setup cost, and licensing?
The price is competitive with other solutions.
Which other solutions did I evaluate?
In addition to Coverity, I have experience with Checkmarx, Fortify, Veracode, and HCL AppScan, which was previously known as IBM AppScan.
Checkmarx is probably the most extensible and customizable of these products, and you're able to use the C# language to do so, which a lot of developers are familiar with.
HCL AppScan is another tool that has customization capabilities. They are not as powerful but they are easier to implement because you don't need to write any code.
I cannot give an endorsement for any particular one. They all have their merits and it just depends on the requirements. Generally, however, all of these tools are getting better.
What other advice do I have?
My advice for anybody who is considering this product is to first look around your organization to see if it has already been implemented in another group. If you're a big organization then Coverity or a similar tool may already be in use. In cases like this, I would say that it is best to adopt the same tool because your organization has already gone down that path and there are no huge differences in the capabilities of these tools. Some of them do it in different ways and some do things that others don't, but you won't have the initial bump of the learning curve and you can leverage their experience.
I would rate this solution a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Technical Specialist at a tech services company with 201-500 employees
Integrates well with Jenkins and GitLab, and has helped us find errors before going into production
Pros and Cons
- "The most valuable feature is the integration with Jenkins."
- "Ideally, it would have a user-based license that does not have a restriction in the number of lines of code."
What is our primary use case?
We have a development team and we are using this product for static code analysis.
How has it helped my organization?
This product has definitely helped our organization. Based on what I have heard from the development team, they have found a lot of issues before code goes into production.
What is most valuable?
The most valuable feature is the integration with Jenkins. Jenkins can be used to automatically run it to perform the code analysis.
Integration with GitLab is helpful.
What needs improvement?
Coverity is too costly, which is why we are trying other tools. Ideally, it would have a user-based license that does not have a restriction in the number of lines of code.
For how long have I used the solution?
We have been using Coverity for between five and six years.
What do I think about the scalability of the solution?
Coverity is used across our entire organization.
How was the initial setup?
The initial setup in the Windows environment was straightforward. However, for Linux, it has some complexity.
What about the implementation team?
We have a separate team in the company that takes care of deployment. One person is enough for the task
What's my experience with pricing, setup cost, and licensing?
The licensing fees are based on the number of lines of code. We may not need more than five user licenses but with a restriction on the number of lines of code, for a small company the cost will shoot up.
Which other solutions did I evaluate?
Our license for Coverity has expired and we are in the process of exploring new static code analysis tools. Ideally, we would like to have one that is low-cost.
One of the products that I have downloaded a trial version for is SonarQube. At this point, I have only installed the Windows version but I plan on testing the Linux version, as well.
What other advice do I have?
In summary, this is a helpful product and the feedback that I have heard from the development team is good. 
 
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Software Integration Engineer at Thales
Enables our entire company to publish the analysis results into our central space
Pros and Cons
- "The features I find most valuable is that our entire company can publish the analysis results into our central space."
- "The setup takes very long."
What is our primary use case?
We use Coverity during the software integration phase. We have a lot of components so we use Coverity to build the components, analyze and publish the data into sonar server and that's our work.
How has it helped my organization?
Depending on our product's needs, we defined the rule set to check and improve the source code.
What is most valuable?
The features I find most valuable is that our entire company can publish the analysis results into our central space. That allows us to see the latest quality of all components on the sonar web page.
What needs improvement?
My personal opinion is that the webpage of the last version of Coverity is not very easy to use. They've made some unnecessary changes and now I can't see all the analysis results or my status from when we started using the solution up to now. Because we have many components on the integration field, it is sometimes hard to find files of one specific component because we use relative path. When I look at the components, they all look very similar. But that is just my personal opinion.
I would also like to see a more user-friendly user interface and configuration. I can see the menu on the left but it's a little different from the other tools that I use, but this is perhaps only a personal thing.
For how long have I used the solution?
We have been working on Coverity for about a year and a half
What do I think about the stability of the solution?
Coverity is a very stable solution.
What do I think about the scalability of the solution?
I believe the solution is scalable. Sometimes I want to put one component in a certain project, and I need to find what's the best way for us. We have a lot of users using Coverity and we will adapt it into our program.
How are customer service and technical support?
Most of the time I just do some research myself and Google their webpage to see how I can find a solution for my problem. The program has a tools team to help find the solutions.
Which solution did I use previously and why did I switch?
My personal business used other tools that offered sonar language tracking. We used a mix of programs with specific options and some standard gcc options. But last year our team preferred to use more visual tools to follow the whole company's policy. That is why we chose Coverity.
How was the initial setup?
We have an administrator for the deployment, so I am only a user. I just added a few projects and streams, and use the data extracted from the compilation, and run the analysis. The setup did take a long time, however.
What about the implementation team?
We implement through an in-house tools team.
What was our ROI?
I don't care it so much.
What's my experience with pricing, setup cost, and licensing?
For the setup, it's better to adapt the solution from the mature projects.
Don't care so much the pricing and licensing being the end user.
Which other solutions did I evaluate?
Before choosing, we tried to use gcc compiler options, i.e.
EXT_GCOV_FLAGS='-fprofile-arcs -ftest-coverage'
EXT_GCOV_LDFLAGS=-fprofile-arcs
EXT_CC_FLAGS=-fdiagnostics-show-option
GCOV_LIB=-lgcov
What other advice do I have?
I will suggest that when they use the program for a new project, they should just copy the data from a mature solution to the new project because the setup really takes a long time. We spent a lot of time to set Coverity up because I thought of creating the project in the Coverity server and use Coverity for the sonar part properly. But it took a long time. I will give the solution a 7.5 rating out of ten. When we officially use all the data, it will accumulate more experiences and then we will have different opinions.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Engineer at a comms service provider with 10,001+ employees
Good security analysis features but it should support more languages and the user interface is not user-friendly
Pros and Cons
- "The security analysis features are the most valuable features of this solution."
- "The quality of the code needs improvement."
What is our primary use case?
We use the on-premise deployment model of this solution. Our primary use case of this solution is for auditing.
What is most valuable?
The security analysis features are the most valuable features of this solution.
What needs improvement?
The quality of the code needs improvement. They should develop a better code.
The interface, efficiency, and the performance also need improvement as well as the languages that it offers. It should have more language options.
The user interface is not user-friendly.
For how long have I used the solution?
I have been using this solution for around three years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
We have 30 users licensed for this solution. We use it when we need it.
How are customer service and technical support?
Their technical support isn't so good. That needs improvement. They don't address the problems I bring up. It's not a priority for them.
Which solution did I use previously and why did I switch?
We previously used an open-source solution before Coverity.
How was the initial setup?
The initial setup was easy. The solution is complex to use but not complex to deploy.
What about the implementation team?
We deployed the solution ourselves.
What's my experience with pricing, setup cost, and licensing?
Licensing is on a yearly basis.
What other advice do I have?
I would recommend this solution depending on the language you're using, Java and C++.
I would rate it a five out of ten. Not a ten because it's not efficient for the language we use.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Works
It gives advice and training on how to resolve the most common quality issues, but the REST implementation is sub-par
What is our primary use case?
- Raising the level of code quality, security, and robustness in the codebase
- Tracking and addressing code quality issues.
 
How has it helped my organization?
Coverity provides developers with a good, best practice, coding advice, and tracks risks of poor coding quality. Coverity reports have urged developers to improve the quality of their code.
What is most valuable?
- I like that it gives advice and training on how to resolve the most common quality issues.
- Links to more details on each issue and the background and risks.
 
What needs improvement?
- Ability to follow source file s-links into the target location for issuing assignments through GIT. Our current build environment uses symbolic links into the git repo and Coverity does not follow the link into the actual location of the source file to determine the git author.
- Single API for all interactions. I am not a fan of using both SOAP and REST APIs and Coverity offers a mix of functionality depending on the interface used. I would greatly prefer a full REST API with improved documentation for all actions including issuing assignments, streaming, and project creation.
For how long have I used the solution?
One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Coverity Static Report and get advice and tips from experienced pros
        sharing their opinions. 
Updated: October 2025
Product Categories
Static Application Security Testing (SAST)Popular Comparisons
SonarQube Server (formerly SonarQube)
Checkmarx One
Veracode
OpenText Core Application Security
OWASP Zap
SonarQube Cloud (formerly SonarCloud)
Acunetix
HCL AppScan
PortSwigger Burp Suite Professional
Qualys Web Application Scanning
Klocwork
GitGuardian Platform
Semgrep
Buyer's Guide
Download our free Coverity Static Report and get advice and tips from experienced pros
        sharing their opinions. 
Quick Links
Learn More: Questions:
- What is the difference between Coverity and SonarQube?
- What is the biggest difference between Coverity and SonarQube?
- How would you decide between Coverity and Sonarqube?
- What Application Security Solution Do You Use That Is DevOps Friendly?
- Which is the most comprehensive open source Web Security Testing tool?
- What is the best Application Security Testing platform?
- When evaluating Application Security Testing, what aspect do you think is the most important to look for?
- SAST vs. DAST: Which is better for application security testing?
- What tools do you rely on for building a DevSecOps pipeline?
- What does the Log4j/Log4Shell vulnerability mean for your company?




















