{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"anzenna.ai","crawled_at":"2026-03-18T06:50:04.373563Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":33014,"rendered_text_length":33014,"ghost_ratio":0,"rendering_type":"SSR","word_count":1056,"li_count":61,"tr_count":0,"th_count":0,"structure_score":5.78000020980835,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":692,"total_html_bytes":524668,"useful_text_bytes":33014,"token_bloat_ratio":15.899999618530273,"images_total":64,"images_with_alt":44,"multimodal_pct":69,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":12324,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":true,"has_website_schema":true,"page_title":"Home - Anzenna","meta_description":"It used to take a dozen security products, and as many operators, to investigate an identity threat, often after it happened. Products and teams don’t","logo_url":"https://www.anzenna.ai/wp-content/uploads/2025/02/cropped-Anzenna-Logo-Mark-40x40-1-32x32.png","crawl_blocked":false,"ai_readiness_score":79,"sub_bot_access":100,"sub_rendering":100,"sub_structure":44,"sub_schema":42,"sub_tech_stack":85,"extractability_score":55,"crawl_cost_score":80,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":59,"acri_extractability":76,"acri_semantic_structure":53,"acri_content_integrity":65,"acri_retrieval_robustness":41,"acri_grade":"C","h1_text":"Your Insider Risk Program, Accelerated","h2_texts":"More than\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t100 Integrations\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\tand counting | Smash your\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\tSecurity Silos | What Customers Say | Eliminate\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\tInsider Risk\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\tfor Good | Key Use Cases | Usecases | How Behavioral Analytics Detects Insider Threats: Why Traditional DLP Fails | Enterprise Windows Application Removal: Why EDR Beats MDM for Emergency Response | My First Week at Anzenna – Using AI to Learn a New Codebase Fast and Contribute Quickly | Blog","tranco_rank":267953,"category":"developer","title_length":14,"meta_desc_length":152,"has_canonical":true,"canonical_url":"https://www.anzenna.ai/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":2,"h2_count":16,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Home - Anzenna","og_description":"It used to take a dozen security products, and as many operators, to investigate an identity threat, often after it happened. Products and teams don’t","og_image":"https://www.anzenna.ai/wp-content/uploads/2025/06/Featured-Image.jpg","twitter_card":"summary_large_image","ttfb_ms":692,"dom_node_count":1411,"html_payload_kb":512.4,"has_hsts":false,"has_csp":false,"cache_control":"public, max-age=0, s-maxage=86400","cf_cache_status":"HIT","sitemap_declared":false,"internal_links":71,"external_links":0,"tracker_scripts":0,"tracker_token_pct":0,"global_score":66,"seo_pillar":66,"geo_pillar":73,"perf_pillar":54,"arch_pillar":64,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":345864,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":2,"llm_analyzed":true,"llm_analyzed_at":"2026-03-13T02:24:15.844876Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Anzenna provides a people-focused security program to combat insider risk.","target_audience":"Security professionals, CISOs, HR leaders, and security teams in enterprises.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Focus on people-centric security, leveraging expertise from former CISOs and security leaders.","content_depth_score":4,"key_pain_points":["Thin landing pages for features","Lack of specific pricing information"]}},"percentile":91,"similar_domains":[{"domain":"xn--80aefbvrodbz.xn--p1ai","acri_score":83,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":7.699999809265137,"schema_count":1,"distance":6.059999942779541,"page_title":"Интернет-магазин саженцев в Москве - Мой Садовод","h1_text":""},{"domain":"gillmarine.com","acri_score":82,"ai_readiness_score":84,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.9000000953674316,"schema_count":1,"distance":7.349999856948852,"page_title":"Gill Marine Official US Store - Pioneers of Technical Marine Apparel - Gill Marine Official US Store","h1_text":""},{"domain":"jitterbit.com","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":7.409999871253967,"page_title":"AI-Powered Enterprise Automation \u0026 Integration | Jitterbit","h1_text":"Automation with AI accountability at its core."},{"domain":"jitterbit.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":7.409999871253967,"page_title":"AI-Powered Enterprise Automation \u0026 Integration | Jitterbit","h1_text":"Automation with AI accountability at its core."},{"domain":"fastpng.com","acri_score":84,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":2,"distance":7.849999856948852,"page_title":"100% Free PNG Images to use [1,000,000+ PNGs]- FastPNG","h1_text":""}]}
