{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"armosec.io","crawled_at":"2026-03-19T03:41:45.54277Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":62524,"rendered_text_length":62524,"ghost_ratio":0,"rendering_type":"SSR","word_count":1100,"li_count":63,"tr_count":0,"th_count":0,"structure_score":5.730000019073486,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":693,"total_html_bytes":338666,"useful_text_bytes":62524,"token_bloat_ratio":5.400000095367432,"images_total":71,"images_with_alt":61,"multimodal_pct":86,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":34857,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"ARMO: Runtime Behavioral Cloud Application Detection \u0026 Response (CADR)","meta_description":"Zero-day and every day protection for your cloud applications with a complete explainable \u0026 traceable runtime security story.","logo_url":"https://www.armosec.io/wp-content/uploads/2024/07/favicon-armo.ico","crawl_blocked":false,"ai_readiness_score":79,"sub_bot_access":100,"sub_rendering":100,"sub_structure":44,"sub_schema":42,"sub_tech_stack":85,"extractability_score":67,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":64,"acri_extractability":86,"acri_semantic_structure":53,"acri_content_integrity":73,"acri_retrieval_robustness":41,"acri_grade":"C","h1_text":"Zero-day and every day protection for your cloud applications with the first runtime behavioral Cloud Application Detection and Response (CADR) solution. A fully explainable \u0026 traceable runtime security story spanning the entire cloud technology stack.","h2_texts":"Trusted by security and loved by Devops at_ | Complete protection for your apps from cloud to code | Eliminate your CVE-noise with runtime reachability analysis | Secure your registries, clusters and images | Minimize your cloud attack surface | Don’t take our word for it | Your Cloud Security, Simplified | Latest Research and Publications","tranco_rank":853959,"category":"developer","title_length":70,"meta_desc_length":125,"has_canonical":true,"canonical_url":"https://www.armosec.io/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":8,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"ARMO: Runtime Behavioral Cloud Application Detection \u0026 Response (CADR)","og_description":"Zero-day and every day protection for your cloud applications with a complete explainable \u0026 traceable runtime security story.","twitter_card":"summary_large_image","ttfb_ms":693,"dom_node_count":911,"html_payload_kb":330.7,"has_hsts":false,"has_csp":false,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://www.armosec.io/sitemap_index.xml","internal_links":69,"external_links":9,"tracker_scripts":0,"tracker_token_pct":0,"global_score":76,"seo_pillar":75,"geo_pillar":83,"perf_pillar":59,"arch_pillar":81,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-04-08T19:23:28.18271Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"ARMO provides a cloud security platform focused on Kubernetes security, offering tools and insights for managing runtime vulnerabilities and security posture.","target_audience":"DevSecOps engineers, Kubernetes administrators, security architects, and cloud security professionals.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"ARMO’s runtime-first approach to Kubernetes security, combined with a comprehensive security posture management platform, differentiates it from traditional vulnerability scanning tools.","content_depth_score":7,"programmatic_seo_signals":["Explore the Hub","Save your Spot"],"key_pain_points":["Most Kubernetes security tools fail teams in practice.","Most Kubernetes security tools miss runtime threats.","Existing application detection tools fail in Kubernetes environments.","You’re struggling to compare cloud security tools."]}},"percentile":91,"similar_domains":[{"domain":"jitterbit.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":3.510000014305114,"page_title":"AI-Powered Enterprise Automation \u0026 Integration | Jitterbit","h1_text":"Automation with AI accountability at its core."},{"domain":"xn--80aefbvrodbz.xn--p1ai","acri_score":83,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":7.699999809265137,"schema_count":1,"distance":3.5399999141693117,"page_title":"Интернет-магазин саженцев в Москве - Мой Садовод","h1_text":""},{"domain":"fastpng.com","acri_score":84,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":2,"distance":3.95,"page_title":"100% Free PNG Images to use [1,000,000+ PNGs]- FastPNG","h1_text":""},{"domain":"furunavi.jp","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":3.9000000953674316,"schema_count":3,"distance":4.1499999999999995,"page_title":"ふるさと納税サイト【ふるなび】｜初めての方でも安心・かんたん寄附！","h1_text":""},{"domain":"blastengine.jp","acri_score":82,"ai_readiness_score":95,"tech_stack":"wordpress","category":"developer","token_bloat_ratio":2.700000047683716,"schema_count":3,"distance":4.510000014305114,"page_title":"【公式】ブラストエンジン（blastengine）｜API連携・SMTPリレー","h1_text":"99％以上の高いメール到達率を実現API連携・SMTPリレーで高速メール配信ブラストエンジン"}]}
