Contact Us
No results found.
Sedat Dogan

Sedat Dogan

CTO
27 Articles
Stay up-to-date on B2B Tech

Sedat is a technology and information security leader with 20 years of experience in software development, network infrastructure and cybersecurity

Technical focus

Sedat is a daily user of the products that he technically reviews. As part of his role at AIMultiple, he oversees the collection of numerous public data points on more than 80,000 B2B technology vendors using proxy, web scraping and web unblocker solutions from multiple providers.

Sedat is also the technical lead for running AIMultiple proxy and web unblocker benchmarks that measures the performance of top web data infrastructure providers annually.

In addition, he designs and conducts AI benchmarks to evaluate the efficiency, scalability, and accuracy of leading artificial intelligence solutions.

Professional experience

Currently, Sedat is the CTO at AIMultiple.

He is also a board advisor at

  • a VC investing in early-stage technology firms
  • Ödeal, a regional digital payment platform serving 125,000 merchants with its POS solutions.

Previously, he worked as

  • CTO at Bionluk, an online marketplace for freelancers
  • CTO at Expertera, a global expertise platform
  • CEO of a cybersecurity services provider
  • CTO and co-founder at a social network

He has 20 years of experience as a white-hat hacker and development guru focused on programming languages and server architectures.

He directed and secured the technological infrastructure and cybersecurity operations of the last seven national elections in his country.

He has also been recognized in the cybersecurity Hall of Fame by global technology leaders including Twitter.

Education

Sedat holds dual bachelor's degrees in engineering from Yıldız Teknik Üniversitesi.

Latest Articles from Sedat

Enterprise SoftwareJan 28

Compare Remote Control Software: NinjaOne & Acronis

We tested the top 3 remote control software (also known as remote access software) to evaluate the general UI and remote control experience, their remote control quality, protocols, and unique capabilities: ​​Strengths and weaknesses based on our observations An agent needs to be installed for each tool we tested in this benchmark.

AIJan 27

Multi-GPU Benchmark: B200 vs H200 vs H100 vs MI300X

For over two decades, optimizing compute performance has been a cornerstone of my work. We benchmarked NVIDIA’s B200, H200, H100, and AMD’s MI300X to assess how well they scale for Large Language Model (LLM) inference. Using the vLLM framework with the meta-llama/Llama-3.1-8B-Instruct model, we ran tests on 1, 2, 4, and 8 GPUs.

CybersecurityJan 26

WAF Solutions: Benchmark-Based Comparison

With two decades of industry experience and market data showing that nearly half of breaches begin with web applications, we manually tested three leading WAFs (Cloudflare, Imperva, Barracuda) against real attack traffic by creating a test site and targeting it with common web threats, broken access control, injection, and vulnerable and outdated components.

Enterprise SoftwareJan 21

Top Serverless Functions: Vercel vs Azure vs AWS

Serverless functions enable developers to run code without having to manage a server. This allows them to focus on writing and deploying applications while infrastructure scaling and maintenance are handled automatically in the background. In this benchmark, we evaluated 7 popular cloud service providers following our methodology to test their serverless function performance.

CybersecurityJan 15

Top 10+ DSPM Vendors to Enhance Data Security

As a technology and information security leader, I selected the top 10 DSPM solutions to discover, classify, and protect sensitive data across IaaS, SaaS, and DBaaS environments.

CybersecurityNov 11

Top 5 DNS Security Solutions: Features & Benchmark

We compared the top DNS security solutions, their features, pricing, and unique aspects to help you find the right protection for your network. Click the product names to see why we recommend them: Benchmark Results With over 20 DNS security tools on the market, picking the right one isn’t straightforward.

CybersecurityOct 8

Top Bot Management Platforms

Bot management identifies real users, good and bad bots, safeguarding websites, APIs, and digital assets from automated threats.