AIMultipleAIMultiple
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
706 Articles
Stay up-to-date on B2B Tech

Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

CybersecuritySep 24

Top 7 Open Source RMM Software: Pros, Cons & Benefits

IT teams and managed service providers (MSPs) require software solutions that allow them to use remote monitoring and management (RMM) tools. While some require enterprise-scale closed-source RMM software, others require free and open-source options.

Enterprise SoftwareSep 8

MFT Pricing: Comparison of Top 3 MFT Vendors' Pricing

Managed File Transfer (MFT) solutions vary widely in terms of pricing, depending on the features and deployment options you choose. Here’s a comparison of some leading MFT pricing: Understanding MFT Pricing Models MFT vendors typically employ different pricing approaches based on deployment requirements and organizational scale: MFT Pricing for different companies 1.

CybersecurityJun 16

Top 10 Open Source Network Security Software

Network security statistics show that data breaches impacted ~350 million people in the U.S. Open source network security software can prevent unauthorized access to network services and identify the most common cyber attack vectors. These software continuously monitor a network for malicious activity and take action to prevent it.

CybersecurityJul 25

Top 10 ZTNA Solutions: Ratings, Size & Pricing

With around 22 million U.S. adults (~14% of the total employed population) working from home full-time, secure remote access is critical. Zero-trust network access (ZTNA) solutions address this need by ensuring only authenticated and authorized users access sensitive resources.

CybersecurityJul 25

6 Data Security Posture Management (DSPM) Use Cases

Network security statistics show that the human factor accounts for ~80% of breaches. Protecting your organization’s data entails more than merely preventing the cyber attack vectors. It is also important to minimize the exposure of sensitive information within the company’s own network.

CybersecurityJul 25

Top 8 SIEM Use Cases and Real-life Examples 

We previously explained open source & commercial SIEM tools, including how to select the best solution.

Enterprise SoftwareJul 21

ERP Pricing: 5 Vendors, 5 Models & 6 Factors

ERPs are popular for providing end-to-end solutions, with the ERP market projected to reach ~$52bn in 2024. However, 47% of organizations faced cost overruns in their ERP implementations in 2023, often due to unclear pricing This article explores ERP pricing models, factors influencing costs, and the pricing structures of 5 vendors.

CybersecurityOct 1

How AI transforms Cybersecurity: Real-Life Examples

By leveraging machine learning, advanced analytics, and automation, AI enables businesses to enhance their security posture, identify vulnerabilities, reduce response times, and allocate resources more efficiently. However, AI is also a double-edged sword; cyber threats are also evolving due to developments in network security and generative AI.

CybersecurityJul 25

Top 7+ Open Source Firewall Options: Features & Types

Network security statistics reveal that Open source firewalls provide a cost effective solution to network security.

DataJul 25

Top 10+ Data Classification Tools Compared

At its core, data classification software help organizations locate and label sensitive data (e.g. customer information) across endpoints, cloud services, databases. These systems are offered either as standalone solutions or modules within larger platforms, like DSPM, DLP or cloud data security software.