Connect with us

Hi, what are you looking for?


Management & Strategy

Synopsys to Acquire Code Testing Firm Cigital

Cigital Acquired by Synopsys

Cigital Acquired by Synopsys

Synopsys, a company that provides tools and services for designing chips and electronic systems, said on Monday that it would acquire Cigital, a provider of software security testing solutions, along with Cigital spin-off Codiscope, which also provides security tools. 

Cigital is a privately held application security firm the specializes in professional and managed services to help customers identify, fix and prevent vulnerabilities in software. 

Codiscope was established as a spin-off of Cigital in 2015, and has has “transformed the tools and intellectual property created by Cigital into a suite of accessible and streamlined tools for a broad population of developers.”

The terms of the deal were not disclosed. In 2014, Synopsys, acquired Coverity, another provider of software quality, testing, and security tools for roughly $375 million.

Cigital was established in 1992 with funding and contracts from DARPA and NASA. In October 2013, the company received a $50 million equity investment from private equity firm LLR Partners.

Cigital is also a driving force behind BSIMM (Building Security In Maturity Model), a study of real-world software security initiatives designed to serve as a measuring stick for secure application development programs.

“The acquisition of Cigital and Codiscope will add complementary products, services, and a highly skilled workforce to the Synopsys portfolio, enabling Synopsys to offer a comprehensive software security signoff solution,” Synopsys explained in the announcement.

Advertisement. Scroll to continue reading.

“Synopsys, Cigital and Codiscope have a shared vision of building security into the software development lifecycle and across the cyber supply chain,” added Andreas Kuehlmann, senior vice president and general manager of the Synopsys Software Integrity Group. 

Jim Ivers, CMO at Cigital, is a SecurityWeek columnist. 

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.