{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"anomali.com","crawled_at":"2026-03-17T21:34:32.112494Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":43299,"rendered_text_length":48110,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":6352,"li_count":146,"tr_count":0,"th_count":0,"structure_score":2.299999952316284,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"cloudflare-pages","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":626,"total_html_bytes":604232,"useful_text_bytes":43299,"token_bloat_ratio":14,"images_total":92,"images_with_alt":4,"multimodal_pct":4,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":35100,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Anomali | AI Threat Intelligence \u0026 Agentic SOC Platform","meta_description":"Discover how Anomali uses AI-driven threat intelligence and a powerful security operations platform to improve visibility, detection and cyber resilience.","logo_url":"https://cdn.prod.website-files.com/68228a4fdbfec3b02c9c5186/68228a4fdbfec3b02c9c5803_Anomali-favicon-32x32-2024.png","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":97,"sub_structure":28,"sub_schema":42,"sub_tech_stack":75,"extractability_score":50,"crawl_cost_score":70,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":46,"acri_extractability":66,"acri_semantic_structure":39,"acri_content_integrity":60,"acri_retrieval_robustness":22,"acri_grade":"D","h1_text":"The agentic soc PLATFORM","h2_texts":"The SOC isn’t broken. The architecture is. | One platform. Three layers. One outcome: faster, smarter defense. | What security teams achieve with Anomali | Watch Anomali Agentic SOC at Work | seamless integration with the tools you already use | See what an Agentic SOC looks like in practice","tranco_rank":297685,"category":"finance","title_length":55,"meta_desc_length":154,"has_canonical":true,"canonical_url":"https://www.anomali.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":6,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Anomali | AI Threat Intelligence \u0026 Agentic SOC Platform","og_description":"Discover how Anomali uses AI-driven threat intelligence and a powerful security operations platform to improve visibility, detection and cyber resilience.","og_image":"https://cdn.prod.website-files.com/6453db2ad32b573c40a15c49/6627ff6e7f8cb72de4b695f6_Anomali-OpenGraph-2024.webp","twitter_card":"summary_large_image","ttfb_ms":626,"dom_node_count":4483,"html_payload_kb":590.1,"has_hsts":true,"has_csp":true,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://www.anomali.com/sitemap.xml","internal_links":180,"external_links":7,"tracker_scripts":0,"tracker_token_pct":0,"global_score":60,"seo_pillar":58,"geo_pillar":62,"perf_pillar":41,"arch_pillar":84,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":373620,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-14T05:49:24.2666Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Anomali provides a Cyber Threat Intelligence Platform for strengthening federal cybersecurity and optimizing data analytics for security productivity.","target_audience":"Security analysts, threat hunters, cybersecurity engineers, and federal cybersecurity professionals.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Advanced threat intelligence analysis and FedRAMP ‘In Process’ status provide a strong security advantage.","content_depth_score":5}},"percentile":78,"similar_domains":[{"domain":"cyfuture.com","acri_score":71,"ai_readiness_score":89,"tech_stack":"cloudflare-pages","category":"finance","token_bloat_ratio":6.199999809265137,"schema_count":3,"distance":7.090000057220459,"page_title":"Data Centers | Cloud Hosting | Tech Support BPO Services – Cyfuture","h1_text":"Transformation awaits you"},{"domain":"dohabank.com","acri_score":71,"ai_readiness_score":82,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":13.699999809265137,"schema_count":1,"distance":11.84000005722046,"page_title":"Doha Bank Qatar - Personal Banking - Doha Bank Qatar","h1_text":"Learn more about our PERSONAL BANKING"},{"domain":"blog.bankbazaar.com","acri_score":71,"ai_readiness_score":85,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":13.399999618530273,"schema_count":1,"distance":11.930000114440919,"page_title":"BankBazaar - Personal Finance Blog","h1_text":""},{"domain":"enterprise.press","acri_score":71,"ai_readiness_score":86,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":13,"schema_count":1,"distance":12.05,"page_title":"Homepage - EnterpriseAM Egypt","h1_text":""},{"domain":"enterpriseam.com","acri_score":71,"ai_readiness_score":86,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":13,"schema_count":1,"distance":12.05,"page_title":"Homepage - EnterpriseAM Egypt","h1_text":""}]}
