AIMultipleAIMultiple
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
706 Articles
Stay up-to-date on B2B Tech

Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

CybersecurityJul 2

Top 10 Open source / Free DAST Tools Compared

We relied on our research on vulnerability scanning tools and DAST to select leading open-source DAST tools and free versions of proprietary DAST software. See our rationale by following the links on product names: As the cost and frequency of cyberattacks increase, businesses are increasingly adopting DAST tools to enhance their security posture.

CybersecuritySep 24

Best 9 Network Monitoring Tools in Windows

We tested and reviewed several network monitoring tools specifically designed for Windows environments. Explore network monitoring tools in Windows for the reasoning behind each choice: During the evaluation, we focused on key aspects to ensure optimal performance and compatibility. * Reviews are based on Capterra and G2.

CybersecurityJun 18

Top 15 AI DLP Best Practices with Case Studies

We analyzed the leading DLP software and, based on our experience with DLP solutions, we identified best practices supported by case studies.

CybersecurityAug 1

Top 5 Digital Guardian Alternatives with Features

Explore the top alternative vendors of Digital Guardian based on our benchmark ratings and data security features such as data classification, context inspection, and behavioral analytics. 5 Digital Guardian alternatives comparison Features See the definitions for common and differentiating features.

CybersecuritySep 24

Key Components of Firewall Compliance: Guidance

Cyber attacks are projected to cost nearly $10 trillion globally in 2024 and data breaches average $5 million each. These highlight the importance of the compliance to industry-specific security policies to strengthen cyber security.

CybersecurityJun 16

Top 7 Next-Generation Firewall (NGFW) Features

Traditional firewalls, which perform simple port and protocol inspection, are less capable than next-generation firewalls (NGFWs) in preventing cyber incidents. NGFWs go beyond simple port and protocol inspection by: Learn what is a next-generation firewall (NGFW) and its top 7 features: 1.

CybersecurityApr 28

Most Common Cyber Attack Vectors

Network security statistics reveal that the cyber attack disruption levels have surged by 200% from 2019 to 2024, compared to a 4% increase from 2011 to 2016. The rise of cyber attacks is alarming since damage to information systems can harm processes, assets, individuals, and organizations.

AIAug 13

Generative AI for Email Marketing: Applications & Examples

Generative AI has evolved beyond basic email content creation to enable real-time personalization, multimodal interactions, and cross-channel orchestration that responds to customer behavior. While 60% of CMOs plan to prioritize AI adoption by 2026,current implementations often miss critical capabilities like dynamic content adaptation and voice-integrated workflows that are reshaping email effectiveness.

CybersecurityJul 27

Top 9 Network Observability Tools

Network observability offers insights into a network’s performance metrics, allowing organizations to identify and address vulnerabilities in a timely manner. Tools that leverage AI can facilitate the automatic detection of anomalies in network traffic and network performance. Top 9 network observability tools * Reviews are based on Capterra and G2.

CybersecuritySep 17

Top 12 LLM DLP Best Practices to Prevent AI Data Leaks

Enterprises are investing in large language models (LLMs) and generative AI, making the protection of sensitive data essential. As GenAI adoption grows, the risk of sensitive data exposure or GenAI data risk becomes a critical AI compliance concern for organizations across industries.