Sena Sezer
Research interests
Sena’s research focuses on emerging AI architectures and enterprise AI infrastructure, particularly in the following areas:
Agentic web architectures
AI memory systems
MCP
Chatbots and ChatGPT
Multi-factor authentication (MFA)
Her work explores how autonomous AI agents interact with web environments, how memory layers enhance contextual reasoning, and how AI systems can be securely deployed and governed within enterprise environments. She is particularly interested in the intersection of AI orchestration, system control, and security frameworks.
Sena is part of the AIMultiple benchmark team. She is working with the AIMultiple tech team to formulate an MFT, IGA benchmark that includes top MFT software providers.
Professional experience
Sena has over 3 years of experience as a technical marketer in e-commerce, where she focused on SEO strategy, product positioning, and data-driven content optimization. She has hands-on experience improving search rankings, enhancing site performance, and aligning technical product specifications with customer expectations.
In addition to her marketing background, she has experience in software development and website design, combining technical execution with user-centered thinking. Her cross-functional background enables her to bridge technical analysis with business impact effectively.
Education
Latest Articles from Sena
Synthetic Users Explained: Top 7 AI User Research Tools
Traditional user research takes weeks: recruiting participants, scheduling sessions, and manually coding transcripts. Synthetic user platforms compress that timeline to hours by generating AI-driven personas you can interview, survey, and test against without the logistics.
Top 6 Open Source Sensitive Data Discovery Tools
The following tools are selected based on GitHub activity and sorted by GitHub star count in descending order. They cover the main use cases for sensitive data discovery: metadata cataloging with lineage, agentless scanning, and API-based detection of PII, PCI data, and credentials at rest. Read more: Sensitive data discovery & classification tools, DLP software.
Top 10 Multi-Factor Authentication (MFA) Solutions
Multi-factor authentication ensures that only authorized users can access accounts, sensitive information, or apps.
Multi-Factor Authentication (MFA) Pricing and Plans
Listed MFA pricing and plans vary based on several factors which increase costs: *$1,500 annual contract minimum. How to select the right MFA plan? An MFA solution that is sufficient for individual usage may not be suitable for a large enterprise with several customers, partners, and business consumers.
Top 10 Application Security Tools: Features & Pricing
The global application security market was valued at USD 10.65 billion in 2025 and is projected to reach USD 42.09 billion by 2033, with a 18.8% CAGR, driven by surging attacks on web and mobile applications, cloud-native adoption, and regulatory requirements, including the EU Cyber Resilience Act.
Top 10+ Network Observability Tools
Network observability gives organizations visibility into network performance, enabling faster identification and resolution of infrastructure issues. Tools in this category increasingly use AI to automate anomaly detection across traffic and device health. Top 8 network observability tools * Reviews are based on Capterra and G2.
GPT-5: Best Features, Pricing & Accessibility
We have GPT-5.2, the latest and one of the most advanced language models. GPT-4 vs. GPT-5 The interactive comparison below shows how GPT-5 differs from GPT-4 across architecture, performance, and pricing.
Mobile Device Management Pricing Comparison: 10+ Products
Understanding pricing structures and other aspects of Mobile Device Management (MDM) software is necessary to make wise decisions. Pricing models vary significantly some vendors charge per device, others per user, and a few bundle MDM into broader platform subscriptions. See how Mobile Device Management pricing is structured and compare MDM products.
IGA Solutions Compared: 6 Vendors with Features and Comparison
Identity Governance and Administration (IGA) enables security administrators to manage user identities and access across the enterprise. We evaluated 5 identity governance and administration (IGA) solutions: SailPoint, Saviynt, Omada, and IBM, across four criteria: provisioning automation, access certification, compliance coverage, and connector breadth.
Top 9 PAM Solutions with Free Alternatives
We spent three days testing and reviewing popular Privileged Access Management (PAM) solutions. We used the free trials and admin consoles of BeyondTrust, Keeper PAM, and ManageEngine PAM360. For solutions that required registration, we relied on official product documentation and verified user experiences to assess their capabilities.
AIMultiple Newsletter
1 free email per week with the latest B2B tech news & expert insights to accelerate your enterprise.