Sedat Dogan
Sedat is a technology and information security leader with 20 years of experience in software development, network infrastructure and cybersecurity
Technical focus
Sedat is a daily user of the products that he technically reviews. As part of his role at AIMultiple, he oversees the collection of numerous public data points on more than 80,000 B2B technology vendors using proxy, web scraping and web unblocker solutions from multiple providers.
Sedat is also the technical lead for running AIMultiple proxy and web unblocker benchmarks that measures the performance of top web data infrastructure providers annually.In addition, he designs and conducts AI benchmarks to evaluate the efficiency, scalability, and accuracy of leading artificial intelligence solutions.
Professional experience
Currently, Sedat is the CTO at AIMultiple.
He is also a board advisor at
- a VC investing in early-stage technology firms
- Ödeal, a regional digital payment platform serving 125,000 merchants with its POS solutions.
Previously, he worked as
- CTO at Bionluk, an online marketplace for freelancers
- CTO at Expertera, a global expertise platform
- CEO of a cybersecurity services provider
- CTO and co-founder at a social network
He has 20 years of experience as a white-hat hacker and development guru focused on programming languages and server architectures.
He directed and secured the technological infrastructure and cybersecurity operations of the last seven national elections in his country.
He has also been recognized in the cybersecurity Hall of Fame by global technology leaders including Twitter.
Education
Sedat holds dual bachelor's degrees in engineering from Yıldız Teknik Üniversitesi.
Latest Articles from Sedat
Cron Alternatives: Top Picks That Outperform in 2026
As a technology and information security professional, I have been using cron across a wide range of applications for the past 20 years. For example, at AIMultiple, we use crontab to orchestrate ~20 cron jobs that run every minute and ~30 less frequent jobs. Based on these experiences, I compiled the most effective cron alternatives.
Top 30 Cloud GPU Providers & Their GPUs in 2026
We benchmarked the 10 most common GPUs in typical scenarios (e.g., finetuning an LLM like Llama 3.2). Based on these learnings, if you: Ranking: Sponsors are linked and highlighted at the top. After that, hyperscalers are listed by US market share. Then, providers are sorted by the number of models that they offer.
Google Workspace Backup: NinjaOne vs Acronis vs CloudAlly
We tested three major SaaS backup solutions to evaluate their performance, features, and usability for Google Workspace email backups. Our benchmark measured backup speeds, restore times, setup ease, and practical functionality across 21 active mailboxes containing over 90,000 emails.
S3 Compatible Cloud Object Storage Benchmark
I have been using Amazon S3 for over a decade. I benchmarked leading S3-compatible object storage providers across nine criteria: ease of migration, data transfer fees, storage costs, retrieval times, mountability, static web hosting, and more. AWS dominates the public cloud market, and S3 is its most widely used storage service.
Analysis of Top 5 Firewall Change Management Software
As the Chief Technology Officer (CISO) of a rapidly-growing organization, I oversee a growing network footprint.
Benchmarked the 10 Best Datacenter Proxy Providers
We evaluated the top 5 datacenter proxy providers using 15,000 requests to assess speed, reliability, and cost across search, e-commerce, and social media sites.
Best TikTok Scraping Tools in 2026 (Python Guide)
In 2026, TikTok moved its U.S. operations to the TikTok USDS Joint Venture, managed by Oracle. This changed how the platform handles data and anti-bot measures. To understand how well different tools handle TikTok data, we tested the leading TikTok scrapers by running 500 unique TikTok videos per provider.
Best LinkedIn Proxies in 2026: Tested for Automation & Scraping
We benchmarked different proxy types for LinkedIn scraping and account management. A proxy alone won’t keep a LinkedIn account safe. Success comes from slow, human-like actions, one high-quality residential or mobile proxy per account, and avoiding aggressive automation.
Best Twitter Proxies in 2026: No Captchas, Bans or Access Limits
We evaluated the top proxy service providers using 30 million requests in our enterprise proxy benchmark. We also used proxies for X.com (formerly Twitter) to assess their performance across various use cases and scales. Best Twitter Proxy Providers of 2026 The minimum cost of a residential proxy plan.
Compare Remote Control Software: NinjaOne & Acronis
We tested the top 3 remote control software (also known as remote access software) to evaluate the general UI and remote control experience, their remote control quality, protocols, and unique capabilities: Strengths and weaknesses based on our observations An agent needs to be installed for each tool we tested in this benchmark.
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.