AIMultipleAIMultiple
No results found.
Cem Dilmegani

Cem Dilmegani

Principal Analyst
706 Articles
Stay up-to-date on B2B Tech

Cem has been the principal analyst at AIMultiple for almost a decade.

Cem's work at AIMultiple has been cited by leading global publications including Business Insider, Forbes, Morning Brew, Washington Post, global firms like HPE, NGOs like World Economic Forum and supranational organizations like European Commission. [1], [2], [3], [4], [5]

Professional experience & achievements

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider. [6], [7]

Research interests

Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity (including network security, application security), data collection including web data collection and process intelligence.

Cem's hands-on enterprise software experience contributes to his work. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.

Education

He graduated as a computer engineer from Bogazici University in 2007. During his engineering degree, he studied machine learning at a time when it was commonly called "data mining" and most neural networks had a few hidden layers.

He holds an MBA degree from Columbia Business School in 2012.

Cem is fluent in English and Turkish. He is at an advanced level in German and beginner level in French.

External publications

Conference & other event presentations

Sources

  1. Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
  2. Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
  3. Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
  4. Science, Research and Innovation Performance of the EU, European Commission.
  5. EU’s €200 billion AI investment pushes cash into data centers, but chip market remains a challenge, IT Brew.
  6. Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
  7. We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

Latest Articles from Cem

CybersecurityJul 25

Demilitarized Zone (DMZ): Examples & Architecture Explained

A Demilitarized Zone (DMZ) network is a subnetwork containing an organization’s publicly accessible services. It serves as an exposed point to an untrusted network, often the Internet. DMZs are used across various environments, from home routers to enterprise networks, to isolate public-facing services and protect internal systems.

CybersecurityJul 7

Top 10 USB Blocking Software

Based on our DLP review benchmark, user reviews & feature comparisons, here are the top 10 USB Blocking Software alternatives. See why we selected them by following the links below: Unmanaged devices increase data breach risk. Control over devices, including USBs, is key to effective cybersecurity.

Enterprise SoftwareSep 25

Top 8 HIPAA Compliant File Sharing Services

Healthcare organizations require managed file transfer solutions that comply with HIPAA requirements while ensuring the secure handling of sensitive patient data. We analyzed solutions based on security certifications, enterprise adoption, and HIPAA-specific features to identify the leading options. Top HIPAA-compliant file-sharing services * Ratings are based on Capterra and G2.

Enterprise SoftwareAug 29

Top 12 Transactional Email Services

We analyzed over 30 transactional email services based on their features & dimensions to identify the following providers.

CybersecurityJul 25

Top 14 Intrusion Detection and Prevention Tools

At its core, intrusion detection and prevention systems (IDPS) monitor networks for threats, alert administrators, and prevent potential attacks. We previously explained real-life use cases of AI IPS solutions.

DataJul 2

Top 5 Retail Audit Services / Companies for CPGs

Consumer packaged goods (CPG) brands and fast-moving consumer goods (FMCG) companies engage with numerous retailers, both local and international. Managing effective and regular retail audits across such a vast network of stores can be daunting and costly. Retail audit services are essential for these CPGs to monitor their retail end efficiently.

Enterprise SoftwareAug 12

Top 10 Email Server Software: Features & Pricing

There are two main use cases for email servers. If you are looking for: Top 5 transactional email providers Sorting: The list ranks providers, with sponsored entries shown first along with their respective links. All non-sponsored providers are listed in order of the total number of B2B user reviews collected from G2 and Capterra.

CybersecuritySep 4

Top 5 Endpoint Management Software with Pricing

According to Microsoft’s Digital Defense Report, the most common case of cybercrime is unauthorized access to unmanaged devices. With the rise of bring-your-own-device (BYOD) implementations and remote/hybrid work trends, businesses are strengthening their network security measures to prevent security compromises.

Enterprise SoftwareSep 22

Top 6 MOVEit Alternatives

We looked at the top alternatives to MOVEit in the secure file transfer space. The best alternatives to MOVEit depend on your specific needs. Look at alternatives based on what matters most: MOVEit alternatives’ comparison * Ratings are based on Capterra, Gartner, and G2. The vendors are listed according to their reviews.

CybersecuritySep 4

Top 10+ RMM Software with Pricing & Features

Based on our RMM benchmark, user reviews & feature comparisons, here are the top RMM software. See why we selected them by following the links below: RMM software components help keep networks secure and efficient, thanks to features like patch management.