Top 10 Insider Threat Management Software in 2024
Research shows that a staggering 88% of data breach cases are driven by employee error.1
Insider threat management software helps organizations by identifying high-risk profiles, optimizing the incident response approach, and monitoring and managing cyberattacks with its insider threat detection capabilities.
Considering the various types of insider threats and tens of insider threat management software options on the market, choosing the best vendor can be challenging. To help organizations on their ITM buying journey, we have prepared a step-by-step approach showing the top ITM software vendors based on their market presence.
Top 10 Insider Threat Management (ITM) software
Vendor Name | # of employees | # of reviews* | Ratings* | Quality of support** | Free trial | Pricing: starts from per user/month |
---|---|---|---|---|---|---|
Coro Cybersecurity | 324 | 1006 | 4.6/5 | 9.6/10 | ✅ | $8.99 |
Teramind | 97 | 204 | 4.6/5 | 8.5/10 | ✅ | $10 |
Safetica | 91 | 209 | 4.6/5 | 9.0/10 | ✖️ | N/A |
Netwrix Auditor | 753 | 179 | 4.5/5 | 8.5/10 | ✅ | $12 |
Proofpoint | 447 | 494 | 4.5/5 | 8.8/10 | ✅ | $10 billed annually |
Code42 | 309 | 422 | 4.5/5 | 8.7/10 | ✅ | $6 |
ActivTrak | 144 | 938 | 4.5/5 | 8.9/10 | ✅ | $10 |
Veriato | 21 | 126 | 4.3/5 | 8.8/10 | ✅ | $25 |
Microsoft Pureview Insider Risk Management | 21 | 18 | 4.2/5 | 8.4/10 | ✖️ | No information available |
BetterCloud | 298 | 407 | 4.1/5 | 9.2/10 | ✅ | No information available |
*Based on the total number of reviews and average ratings on software review platforms G2, TrustRadius, and Capterra. Sorted by average rating score in descending order.
**Based on the quality of support ratings on G2.
We also examined and compared the most essential ITM software features to prepare the following list. As all vendors offer data loss prevention (DLP), firewalls, centralized management, virtual private networks (VPN), real-time monitoring, and centralized management, we excluded these features from the list.
Vendor | User behavior analytics | Monitored data anonymization | Compliance management | Customizable policies | Free database support | Omni-channel customer support | Deployment options |
---|---|---|---|---|---|---|---|
Coro Cybersecurity | ✅ | ✅ | ✅ | ✖️ | ✖️ | Chat 24/7 (Live rep) Email/Help Desk Phone Support FAQs/Forum | Cloud, SaaS, Web-based |
Teramind | ✅ | ✖️ | ✅ | ✅ | ✅ | Knowledge Base Email/Help Desk Chat Phone Support FAQs/Forum 24/7 (Live rep) | Cloud, SaaS, Web-based On-Premise Windows On-Premise Linux |
Safetica | ✅ | ✖️ | ✅ | ✅ | ✅ | Email/Help Desk Knowledge Base FAQs/Forum Chat Phone Support | Cloud, SaaS, Web-based On-Premise Windows |
Netwrix Auditor | ✅ | ✅ | ✅ | ✅ | ✖️ | Knowledge Base Chat Email/Help Desk Phone Support FAQs/Forum | Cloud, SaaS, Web-based On-Premise Windows |
Proofpoint | ✅ | ✅ | ✅ | ✅ | ✖️ | Chat 24/7 (Live rep) Email/Help Desk Phone Support FAQs/Forum | Cloud, SaaS, Web-based |
Code42 | ✖️ | ✅ | ✅ | ✅ | ✖️ | Email/Help Desk Phone Support | Cloud, SaaS, Web-based |
ActivTrak | ✅ | ✅ | ✅ | ✅ | ✅ | Chat Knowledge Base FAQs/Forum Email/Help Desk Phone Support | Cloud, SaaS, Web-based |
Veriato | ✅ | ✖️ | ✖️ | ✅ | ✖️ | Knowledge Base Email/Help Desk Chat FAQs/Forum Phone Support | Cloud, SaaS, Web-based On-Premise Windows On-Premise Linux |
Microsoft Pureview Insider Risk Management | ✅ | No information is available | ✖️ | ✅ | No information is available | Knowledge Base FAQs/Forum Email/Help Desk | Cloud, SaaS, Web-based |
BetterCloud | ✅ | ✅ | ✅ | ✖️ | ✖️ | FAQs/Forum Email/Help Desk Chat Knowledge Base | Cloud, SaaS, Web-based |
Disclaimer: These lists are based on publicly accessible data from companies’ websites and industry-leading peer review sites (PRS) such as G2, Carterra, and Trustradius.
Vendor selection criteria
Insider threat management software landscape is broad, there are various vendors to compare, therefore we narrowed down our benchmarking based on certain criteria, such as the number of B2B reviews. We selected these criteria as they are public and verifiable through vendors’ websites or software review platforms. We included companies with:
- 20+ employees
- 15+ reviews on software review platforms such as G2, Capterra, and TrustRadius.
Evaluation of the top Insider Threat Management (ITM) Software
1- Coro Cybersecurity
Pricing (user/mo)
- Coro Annual + Cyber Advisor: Starting from $8.99
- Coro Edge: Starting from $11.99
- A free trial is available.
User ratings
- G2: 4.7/5
- Capterra: 4.6/5
- Trustradius: Not available
- Total number of reviews: 1006
Pros
Easy to use: Coro offers an excellent high-level dashboard that is simple to navigate.
Source: G22
Successful integration with small IT teams: Coro integrates well with small IT teams, it offers a diverse selection of spam and other malicious activity reporting. It also sends real-time alerts by email that report possible breaches and login locations.3
Low licensing cost: Coro Cybersecurity has an affordable subscription fee.4
Cons
No in-app feature to reach customer service: Reaching the support team is difficult; there is no direct link to contact the support team or create a ticket.
Source: G25
False negative detections: Occasional false-negative detections on unwanted emails are frequently reported by users.6
Users cannot whitelist suspicious e-mails: Users are unable to remove suspicious emails. The IT staff must whitelist the valid emails that are detected.
2- Teramind
Pricing (user/mo)
- Cloud or on-premise Teramind Starter: Starting from $10.00
- Cloud or on-premise Teramind UAM (User Activity Monitoring): Starting from $21.00
- On-premise Teramind DLP (Data Loss Prevention): Starting from $25.00
- A free trial is available.
User ratings
- G2: 4.6/5
- Capterra: 4.7/5
- Trustradius: 9.2/10
- Total number of reviews: 204
Pros
Simple UI: Many customers value how simple it is to manage programs, create statistics on usage, and precisely measure behavior analytics.
Source: G27
Remote monitoring and reporting: Reviewers say Teramind is efficient for remotely tracking employee behavior and checking their work.
Detailed security and oversight: Teramind maintains high safety and provides an in-depth overview of employees’ actions which helps to identify potential risks and ensure data integrity.
In-depth user behavior monitoring: Users have complimented Teramind for its efficient monitoring features, which include video recording, fraud detection, document monitoring, and real-time feeds.
Cross-platform framework: Teramind can monitor and assess user behavior on web pages and mobile platforms, which makes it convenient for reviewers to improve efficiency, streamline workflows, and gain well-informed insights on a cross-platform level.
Cons
Redundant features: Some users have considered Teramind to have an unnecessary number of capabilities and features, making it challenging to navigate and efficiently use the program.
Source: G28
Complicated set-up process: Many reviews have noted that setting up Teramind can be difficult, especially when setting up productivity measurement indicators.
Disconnections and Delays: Customers have observed that Teramind occasionally disconnects from the network, causing disruptions in its operation.
3- Safetica
Pricing
- No pricing information is available
User ratings
- G2: 4.5/5
- Capterra: 4.7/5
- Trustradius: 9.3/10
- Total number of reviews: 209
Pros
High user control: Safetica allows users to create particular policies and set limits on who has access to data. Users may restrict selected users from publishing documents by blocking them.
Source: G29
Ease of use: Safetica is simple to use, users can find the information they are searching for with one click on the console.10
Built-in UEBA and DLP solutions: Safetica comes with in-app UEBA and DLP solutions, and depending on the UEBA results, users can set up optimized DLP limitations, making it extremely simple to report and follow DLP policies.11
Cons
Safetica has two parts: The parts are Safetica Console and Web Safetica (web application), and users need to jump between the console and web application while using the functions.
Source: G212
High price tag: Safetica’is is expensive for tight-budget organizations.13
Unnecessary security notification: Users encounter pop-up security notifications while connecting to dashboards and devices.
Short-period time for the free trial: The free version is available for only a short time, users cannot properly test the features and functions before making a purchasing decision.14
4- Proofpoint
Pricing (user/mo)
- Business: $3.03
- Business+: $3.36
- Advanced: $4.13
- Advanced+: $5.13
- Professional: $5.86
- Professional: $6.86
- A free trial is available.
User ratings
- G2: 4.6/5
- Capterra: 4.2/5
- Trustradius: 9.1/10
- Total number of reviews: 494
Pros
User-friendly: Proofpoint’s email protection module is user-friendly and enables easy customization of custom email firewall settings.
Strong customer focus: Customer support services offer round-the-clock assistance to address issues as they arise.
Source: G215
Strong service expertise: Customers often have a dedicated support team or account manager who can assist with their specific needs.16
Robust product functionality and performance: The email security solution works well with AI to filter out spam emails reducing the clutter in your inbox.17
Cons
Non-exhaustive reporting: The reporting system is straightforward but could be improved for case management and incident analysis.
Source: TrustRadius18
Unclear in-app purchase options: Users find it unclear that purchasing plans do not appear in the application.19
5- Netwrix Auditor
Pricing (user/mo)
- Netwrix Auditor: Starting from $12
- A free trial is available.
User ratings
- G2: 4.4/5
- Capterra: 4.5/5
- Trustradius: Not available
- Total number of reviews: 179
Pros
Simple usage and configuration: It is easy to deploy, configure, and deploy the Netwrix Auditor and setup solution, which allows you to be ready to start working quickly.
Source: G220
Efficient ransomware detection for GDPR compliance: Netwrix Auditor fully supports compliance requirements. It sets up alerts for user lockouts and failed passwords and detects ransomware by reporting unusual file transfers and downloads.21
Powerful auditing: It offers robust AD integration and auditing of files, databases, and SharePoint servers.22
Cons
Slow audits: If your database queries are too slow, Netwrix will be slow as well.
Source: G223
Extra costs: Users encountered extra costs for monitoring unnecessary people, such as students.24
6- Code42
Pricing (user/mo)
- Cloud Standard: Starting from $6
- Cloud Premium: Starting from $9
- A free trial is available.
User ratings
- G2: 4.2/5
- Capterra: 4.5/5
- Trustradius: 9.6/10
- Total number of reviews: 422
Pros
Customizable usage: Code42 offers highly versatile backup options. Users can modify which files to back up, how frequently to back up them, and how much CPU and bandwidth should be used.
Efficient backups: Code42 can backup network drives, such as the ones stored on a Synology NAS, making the process much simpler and affordable.
Easy deployment: Code42 is simple to set up and deploy. A technical employee walks you through the steps, making the implementation painless.
Unlimited backups: Code42 offers unlimited data backup to both the server and the local drive.
High visibility: Code42 is controlled and centralized via a website, giving administrators extensive oversight and control over up-to-date backup status.
Cons
High price: The cost of Code42 is one of its greatest drawbacks; at $10/user/mo, it is more than twice as expensive as some other services.
Back-end system crashes: There are occasions when the back-end services will crash and the front-end Java app won’t load on the Code42 desktop system. Restarting the machine or the service resolves the problem; however, crashes require additional troubleshooting.
Low granularity: The Code42 is Java-based, which creates drawbacks such as a gauche interface and overall less stable usage.
Limited access for downloading data: Code42 offers restricted access to downloading your data. You must request that they provide your data on an external drive if you need to retrieve even a small amount of data.
7- ActivTrak
Pricing(user/mo)
- Essentials: 10$ billed annually
- Professional: 17$ billed annually
- A free trial is available.
User ratings
- G2: 4.4/5
- Capterra: 4.6/5
- Trustradius: 8.8/10
- Total number of reviews: 938
Pros
Detailed insights and analysis: ActivTrak includes an active dashboard of the overall status of employee and group statistics.
Source: TrustRadius25
Worked hours tracking: ActivTrak also has a method for quickly identifying worked hours to detect those who are putting in additional hours.26
Strong IT support: The IT support desk is effective, users who log in to their portal, will be chatting to a professional in minutes.
Cons
Insufficient onboarding support: ActivTrak could have better onboarding training that provides more support about how to structure a back-of-house setup.
Unproductive menu structure: There are advertisements in the menu structure that direct you to an upgrade link.
Complex reporting: Reports could be more detailed and well-organized, and it can be problematic to find the proper report.
8- Veriato
Pricing (user/mo)
- Veriato Vision: Starting at $25.00
- A free trial is available.
User ratings
- G2: 4.4/5
- Capterra: 4.2/5
- Trustradius: Not available
- Total number of reviews: 126
Pros
Efficient user-behavior tracking performance: Veriato’s monitoring feature offers state-of-art behavior-based recommendations and broad analytics that work well to cut down false positives.
Source: G227
Analyzing productivity is easy: It is simple to assess employee productivity, and the reports are simple to read and follow, especially, in hybrid/remote settings.28
Company-wide protection: Veriato can follow up to 300,000+ devices.
Cons
In-app features provide non-intuitive UX: The limitations of possible integrations, policy creations, and visualizations in charts might be more intuitive.
Source: G229
May not work on remote workstations: Safetice doesn’t work well when employees remotely access a workplace computer from their devices.30
Problematic camera feature: Camera application may create conflicts.31
9- Microsoft Pureview Insider Risk Management
Pricing
- No pricing information is available
User ratings
- G2: 4.2/5
- Capterra: Not available
- Trustradius: Not available
- Total number of reviews: 18
Pros
Simple and user-friendly design: The program is simple to use, it has a user-friendly design and automatic integration with existing systems.
Granular insights: Detailed and optimizable real-time monitoring and advanced analytics enable users to acquire unique insights.
Source: G232
Cross-platform connections: The solution can integrate with Microsoft 365 services and programs allowing organizations to use existing data to identify insider risks more effectively.
Cons
Extra subscription cost: Users are forced to purchase an additional subscription option to access all of the functionality.
Source: G233
Limited functionality: When compared to other risk tools, its analysis and search prospects are quite limited.
Long report generation time: Report generation can sometimes take longer.34
10- BetterCloud
Pricing (user/mo)
- BetterCloud one: $3
- BetterCloud core: $6
- BetterCloud enterprise: $10
User ratings
- G2: 4.4/5
- Capterra: 4.0/5
- Trustradius: 8.0/10
- Total number of reviews: 407
Pros
Automated bulk administration: BetterCloud’s onboarding and offboarding automation feature helps users streamline processes.
Source: TrustRadius 35
Content-oriented reporting: Drive reporting enables admins to take control of their work by content-oriented scanning on G Suite and Google Drive.
Functional and extensive reporting: BetterCloud offers an extensive selection of canned reports, but it also allows users to make their reports using simple drag-and-drop features.
High flexibility across networks: BetterCloud enables administrators to create workflows and perform actions across several pre-connected networks, but it also enables them to connect networks via API.
Cons
Long configuration time: It can take months for employees to get familiar with the product. The setup and configuration of the product take weeks.
Unstable: The software is unsteady and frequently delays or crashes, it sometimes takes a long time to load the app.
Complex UI: The UI may feel quite disorganized, and it is time-consuming to operate the workflow.36
Confusing documentation: The documentation could be improved, but the written instructions for workflows and API are tricky to understand.
When should you use insider threat management (ITM) software?
If you have observed one or more risks listed below you should consider implementing an insider threat management program to prevent your organization from potential insider threats:
Unusual data flow: Insiders may perform unusual behaviors related to system, network, or data access, such as downloading private data at unusual times that are beyond their typical job duties.
Excessive Data Access: Frequent increases in data download or transferring documents through Airdrop indicates a need for ITM tools.
Unauthorized software use: Insiders may access networks, files, or databases that are beyond their permitted scope and install unauthorized software to speed up tasks to make data exfiltration easier. This creates vulnerability in data security.
Renamed files with content that was different from the file extension: By renaming files, insiders may attempt to cover up their data exfiltration.
Privilege or permission request escalation: When more employees, contractors, or vendors ask for access to sensitive data, it raises suspicion because there are now potentially more connected users.
Quitting employees: Noticing file movement coming from high-risk departing employees is an indicator of internal risk.
12 essential ITM software features
1- Data loss prevention (DLP)
DLP software applies rules to categorize sensitive data to detect data breaches, exfiltration, and unwanted damage. Data loss prevention is used to uphold data security policies such as GDPR, HIPAA, and PCI-DSS.
Companies that use DLP can avoid transferring, using, or sharing sensitive data in an unsafe or inappropriate manner. It can assist your company across on-premises systems, cloud-based locations, and endpoint devices. When DLP detects policy violations, it will issue notifications and take other steps to prevent users from data. It will frequently use AI to monitor for unusual activity before it causes damage or loss.
2- Firewall
Firewall, is a security device (hardware, software, SaaS, or cloud ) that tracks network traffic and determines whether or not to allow or block traffic based on privacy regulations. When combined with an intrusion prevention system (IPS), these firewalls are capable of detecting and reacting to external attacks across the entire network rapidly and effectively.
It helps your business by
- Preventing attackers from gaining access to local resources
- Protecting network traffic by email filtering, and access control
- Blocking application-layer attacks and malware
3- Virtual private network (VPN)
A VPN is an encrypted connection that connects two points. This can be performed by assigning an identification code to the user.
VPN-powered ITM software can help businesses to
- Secure Connectivity: The encrypted structure of a VPN makes it difficult for an outsider to gain access to a connection.
- Access Management: Every business has data that are exclusively restricted to internal users. A VPN enables “internal” access to an outside user or site since the VPN endpoint is behind the network firewall, allowing registered users to connect to these tools without making them publicly visible.
4- Real-time monitoring
Real-time monitoring involves collecting performance indicators by streaming data from infrastructure devices, apps, and services as data flows across your network.
Real-time monitoring can be used to:
- Assist administrators in understanding the ITM software’s steady state.
- Monitor the queue administrator’s state at any given time, even if no particular incident or issue has been noticed.
- Help with identifying the source of the systemic problem.
5- Centralized framework
Decentralized cyber security solutions within a network limit an organization’s ability to respond rapidly to constantly changing threats and privacy concerns. A centralized system will allow the end users to actively configure, manage, and update the software by prioritizing the goals of the business.
6- User behavior analytics
User behavior analytics (UBA), commonly referred to as user and entity behavior analytics (UEBA), is the process of acquiring data from network activities that users contribute. It may be used to identify the usage of compromised data, divergences in user behavior, and other malicious activities.
7- Monitored data anonymization
Monitored data anonymization protects personally identifiable information (PII), which refers to any information that can be used to pinpoint a particular person (also known as “endpoint personal data”). The endpoint data is collected throughout ITM software’s monitoring session of employee activities. It ensures compliance with data protection and privacy laws such as the European Union’s General Data Protection Regulation (GDPR) law to protect personally identifiable information.
8- Compliance management
Compliance management governs data and IT systems by leveraging audits and documented procedures to guarantee that businesses protect client information in line with data privacy laws and regulations such as the California Consumer Privacy Act (CCPA) or General Data Protection Regulation (GDPR).
Without rigorous compliance management, your organization may face penalties as a result of poor security and data management. A standardized compliance management can help your organization to apply proper authorization controls and to ensure that actions are recorded, and investigations into breaches can be conducted.
9-Customizable policies
Custom Policies enable your organization’s special demands to be met by enforcing software infrastructure setup. Companies can implement a labeling technique or an exclusive encrypted login procedure such as a password authentication protocol (PAP) for certain assets and employees, or they may restrict a service based on other networks it is linked to.
10- Free database support
Free database software support provides financial savings, organizations can avoid the high licensing fees linked to commercial database software by settling for a free alternative. This enables organizations, particularly small businesses and startups with limited resources, to reallocate their finances appropriately.
11-Omni-channel customer support
76% of customers want a consistent experience regardless of how they engage with a business.37 Omnichannel customer service allows customers to contact a company via several channels, including email, social media, phone FAQs/forums, 24/7 online chat, and messaging apps.
12- Deployment options
On-premise: On-premises deployment requires all databases, software, and networking to be stored on your company’s premises which demands the IT staff at your business to maintain the deployment on their own.
Cloud: Cloud deployment is the continuous deployment of services and resources for computing through the web (“the cloud”) rather than using one’s servers and hardware.
Aspects to keep in mind while selecting insider threat management (ITM) software
Formulating an effective insider threat management program requires you to consider numerous aspects while selecting the most suitable software for your organization:
Cost: Making a selection based only on pricing might not guarantee that your company receives the best value. Most low-cost software has hidden maintenance, training, data mitigation, or hardware & IT costs, to be deployed and used.
Future Growth: Avoid solutions that cannot grow with your organization. Estimate your long-term needs, and how much software charges your organization as the number of users, and operations grow. You may discover that the less costly solution gets overly expensive.
Performance: Organizations should test the technology before installing it in an everyday context. Understand how a product performs and identifies possible privacy, security, and availability risks.
Licensing: Check the security page for any solution before signing any contracts. You should have a compliance professional to analyze the security documentation. Evaluate licensing agreements to make sure that they are in line with data compliance (such as PCI, HIPAA, Section 508, GDPR, and WCAG regulations). It is best to include all partners, including attorneys, early in the project to save money, ensure compliance, and secure buy-in.
Updates: The top software businesses keep their products up-to-date. When selecting vendors, inquire about how frequently they deploy updates to their products and how those upgrades are conveyed. It’s also crucial to request a “product status page” from your software vendors so you may examine prior communications about any product issues and improvements.
Further reading
For more on data and organizational security, please read our comprehensive guide on insider threat management (ITM).
External links
- 1. “Psychology of Human Error 2022”. (PDF). Tessian. January, 2022. Retrieved September 24, 2023.
- 2. ”Coro Cybersecurity Reviews 2023“, G2, Jun 08, 2023. Retrieved September 25, 2023
- 3. ”Coro Cybersecurity Reviews 2023“, G2, June 8, 2023. Retrieved September 25, 2023
- 4. ”Coro Cybersecurity Reviews 2023“, G2, Retrieved September 25, 2023
- 5. ”Coro Cybersecurity Reviews 2023“, G2, Retrieved September 25, 2023
- 6. ”Coro Cybersecurity Reviews 2023“, G2, Retrieved September 25, 2023
- 7. ”Teramind Reviews 2023“, G2, Retrieved September 25, 2023
- 8. ”Teramind Reviews 2023“, G2, Retrieved September 25, 2023
- 9. ”Safetica Reviews 2023“, G2, Retrieved September 25, 2023
- 10. ”Safetica Reviews 2023“, Capterra, Retrieved September 25, 2023
- 11. ”Safetica Reviews 2023“, Capterra, Retrieved September 25, 2023
- 12. ”Safetica Reviews 2023“, G2, Retrieved September 25, 2023
- 13. ”Safetica Reviews 2023“, Capterra, Retrieved September 25, 2023
- 14. ”Safetica Reviews 2023“, Capterra, Retrieved September 25, 2023
- 15. ”Proofpoint Reviews 2023“, G2, Retrieved September 25, 2023
- 16. ”Proofpoint Reviews 2023“, TrustRadius, Retrieved September 25, 2023
- 17. ”Proofpoint Reviews 2023“, G2, Retrieved September 25, 2023
- 18. ”Proofpoint Reviews 2023“, TrustRadius, Retrieved September 25, 2023
- 19. ”Proofpoint Reviews 2023“, TrustRadius, Retrieved September 25, 2023
- 20. ”Netwrix Auditor Reviews 2023“, G2, Jun 07, 2022, Retrieved September 25, 2023
- 21. ”Netwrix Auditor Reviews 2023“, G2, Aug 29, 2018, Retrieved September 25, 2023
- 22. ”Netwrix Auditor Reviews 2023“, Capterra, October 22, 2018, Retrieved September 25, 2023
- 23. ”Netwrix Auditor Reviews 2023“, G2, Feb 21, 2019, Retrieved September 25, 2023
- 24. ”Netwrix Auditor Reviews 2023“, Capterra, April 21, 2020, Retrieved September 25, 2023
- 25. ”ActivTrak Reviews 2023“, TrustRadius, Retrieved September 25, 2023
- 26. ”ActivTrak Reviews 2023“, TrustRadius, Retrieved September 25, 2023
- 27. ”Veriato Reviews 2023“, G2, Retrieved September 25, 2023
- 28. ”Veriato Reviews 2023“, G2, Retrieved September 25, 2023
- 29. ”Veriato Reviews 2023“, G2, Retrieved September 25, 2023
- 30. ”Veriato Reviews 2023“, G2, Retrieved September 25, 2023
- 31. ”Veriato Reviews 2023“, Capterra, Retrieved September 25, 2023
- 32. ”Microsoft Pureview Insider Risk Management Reviews 2023“, G2, Retrieved September 25, 2023
- 33. ”Microsoft Pureview Insider Risk Management Reviews 2023“, G2, Retrieved September 25, 2023
- 34. ”Microsoft Pureview Insider Risk Management Reviews 2023“, G2, Retrieved September 25, 2023
- 35. ”BetterCloud Reviews 2023“, TrustRadius, Retrieved September 25, 2023
- 36. ”BetterCloud Reviews 2023“, TrustRadius, Retrieved September 25, 2023
- 37. ”What are customer expectations, and how have they changed?”. Salesforce. Retrieved September 25, 2023
Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 60% of Fortune 500 every month.
Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE, NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and media that referenced AIMultiple.
Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised businesses on their enterprise software, automation, cloud, AI / ML and other technology related decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.
He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.
Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.
To stay up-to-date on B2B tech & accelerate your enterprise:
Follow on
Comments
Your email address will not be published. All fields are required.