No results found.
Sedat Dogan

Sedat Dogan

CTO
26 Articles
Stay up-to-date on B2B Tech

Sedat is a technology and information security leader with 20 years of experience in software development, network infrastructure and cybersecurity

Technical focus

Sedat is a daily user of the products that he technically reviews. As part of his role at AIMultiple, he oversees the collection of numerous public data points on more than 80,000 B2B technology vendors using proxy, web scraping and web unblocker solutions from multiple providers.

Sedat is also the technical lead for running AIMultiple proxy and web unblocker benchmarks that measures the performance of top web data infrastructure providers annually.

In addition, he designs and conducts AI benchmarks to evaluate the efficiency, scalability, and accuracy of leading artificial intelligence solutions.

Professional experience

Currently, Sedat is the CTO at AIMultiple.

He is also a board advisor at

  • a VC investing in early-stage technology firms
  • Ödeal, a regional digital payment platform serving 125,000 merchants with its POS solutions.

Previously, he worked as

  • CTO at Bionluk, an online marketplace for freelancers
  • CTO at Expertera, a global expertise platform
  • CEO of a cybersecurity services provider
  • CTO and co-founder at a social network

He has 20 years of experience as a white-hat hacker and development guru focused on programming languages and server architectures.

He directed and secured the technological infrastructure and cybersecurity operations of the last seven national elections in his country.

He has also been recognized in the cybersecurity Hall of Fame by global technology leaders including Twitter.

Education

Sedat holds dual bachelor's degrees in engineering from Yıldız Teknik Üniversitesi.

Latest Articles from Sedat

CybersecurityDec 20

Top 12 RMM Software Tested: Features and Pricing

RMM software components keep business devices secure and efficient, thanks to features like patch management. We benchmarked top 3 RMM platforms (NinjaOne, ManageEngine, and Acronis) by deploying them to seven servers across six AWS regions. We analyzed how they handle agent deployment and monitoring from scratch.

CybersecurityDec 19

Google Workspace Backup: NinjaOne vs Acronis vs CloudAlly

We tested three major SaaS backup solutions to evaluate their performance, features, and usability for Google Workspace email backups. Our benchmark measured backup speeds, restore times, setup ease, and practical functionality across 21 active mailboxes containing over 90,000 emails.

CybersecurityDec 19

Top 5 SaaS Backup Solutions

Many businesses operate under the misconception that their SaaS providers (like Microsoft 365 or Google Workspace) fully protect their data from all threats. While these platforms offer robust infrastructure and some level of data redundancy, they do not protect against accidental deletion, ransomware, or insider threats.

DataDec 19

5 Best Facebook Scrapers + Facebook Scraping with Python

Using Python and a managed scraper API for Facebook scraping allows you to collect public posts, comments, likes, and shares. This tutorial demonstrates how to scrape Facebook posts by keyword and retrieve their URLs via Google search.

DataDec 19

12 Best Residential Proxy Providers (Benchmark Tested)

As AIMultiple’s CTO, I lead data collection from thousands of websites and run residential proxy benchmarks, including a load test with 100,000 parallel requests.

CybersecurityDec 17

MySQL Monitoring: SolarWinds vs New Relic vs Datadog

We installed three database monitoring platforms on a clean system running MySQL to see how they handle database monitoring from scratch. We examined: ease of setup, onboarding experience, agent resource consumption, accuracy in metric measurement, and effectiveness of their alerting systems’ notifications when issues arise under real-world database workloads.

CybersecurityDec 17

MongoDB Monitoring: SolarWinds vs New Relic vs Datadog

Monitoring tools promise easy integration, but which ones actually deliver when you’re not a DevOps expert? We installed Solarwinds, Datadog, and New Relic on clean systems running MongoDB 7.0 to find out. Our infrastructure team went through each tool’s complete setup process, documenting every step and roadblock.

DataDec 5

8 Best LinkedIn Proxies Tested: Scraping & Automation

We benchmarked different proxy types for LinkedIn scraping and account management. A proxy alone won’t keep a LinkedIn account safe. Success comes from slow, human-like actions, one high-quality residential or mobile proxy per account, gradual warm-ups, and avoiding aggressive automation.

CybersecurityDec 3

Benchmark-Based Comparison of WAF Solutions

With two decades of industry experience and market data showing that nearly half of breaches begin with web applications, we manually tested three leading WAFs (Cloudflare, Imperva, Barracuda) against real attack traffic by creating a test site and targeting it with common web threats, broken access control, injection, and vulnerable and outdated components.

CybersecurityNov 30

Top 10+ DSPM Vendors to Enhance Data Security

As a technology and information security leader, I selected the top 10 DSPM solutions for discovering, classifying, and protecting sensitive data across IaaS, SaaS, and DBaaS environments.