{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"axiadids.net","crawled_at":"2026-03-17T12:04:16.244532Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":6846,"rendered_text_length":7607,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":985,"li_count":0,"tr_count":0,"th_count":0,"structure_score":0,"has_org_schema":true,"has_product_schema":true,"schema_count":1,"tech_stack":"cloudflare-pages","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":8809,"total_html_bytes":129017,"useful_text_bytes":6846,"token_bloat_ratio":18.799999237060547,"images_total":234,"images_with_alt":70,"multimodal_pct":30,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":6776,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Axiad - Trusted Identity. At the speed of now.","meta_description":"Axiad brings clarity and order to identity security by tackling the critical threats posed by the increases in the surface of identity attacks.","logo_url":"https://cdn.prod.website-files.com/67287422d51824fcbb67e68b/673e651f244aba7f346cef1c_favicon-32x32.png","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":97,"sub_structure":0,"sub_schema":82,"sub_tech_stack":75,"extractability_score":50,"crawl_cost_score":40,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":43,"acri_extractability":67,"acri_semantic_structure":30,"acri_content_integrity":66,"acri_retrieval_robustness":20,"acri_grade":"D","h1_text":"Trusted Identity.At the speed of now.","h2_texts":"Prove trust, simplify operations, and cut costs. | Addressing Your Most Critical Identity Challenges | Each Industry Faces Different Identity and Authentication Challenges | Success Stories | Stay Updated with the Latest Security Insights","tranco_rank":195341,"category":"infrastructure","title_length":46,"meta_desc_length":143,"has_canonical":true,"canonical_url":"https://www.axiad.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":5,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Axiad - Trusted Identity. At the speed of now.","og_description":"Axiad brings clarity and order to identity security by tackling the critical threats posed by the increases in the surface of identity attacks.","og_image":"https://cdn.prod.website-files.com/67287422d51824fcbb67e68b/678e4283620c663f44b1b543_Home%201.png","twitter_card":"summary_large_image","ttfb_ms":8809,"dom_node_count":1262,"html_payload_kb":126,"has_hsts":true,"has_csp":true,"cf_cache_status":"HIT","sitemap_declared":false,"internal_links":113,"external_links":36,"tracker_scripts":0,"tracker_token_pct":0,"global_score":66,"seo_pillar":84,"geo_pillar":65,"perf_pillar":40,"arch_pillar":70,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":246957,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":10,"llm_analyzed":true,"llm_analyzed_at":"2026-03-10T00:28:17.64897Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Axiad Mesh is an identity visibility and intelligence platform designed to unify all identity sources and detect/mitigate risk to businesses,","target_audience":"Government agencies, financial institutions, cybersecurity professionals, and organizations concerned with identity risk and compliance.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":["PCI DSS","CMMC"],"competitive_moat":"Unique identity risk management solution unifying all identity sources for proactive threat detection and mitigation.","content_depth_score":6,"programmatic_seo_signals":["Blog / Risk","Blog / Compliance","Blog / Announcements"],"key_pain_points":["Identity risk","Quantum encryption","Compliance regulations","Phishing","State-sponsored cyber threats"]}},"percentile":78,"similar_domains":[{"domain":"bongda24h.vn","acri_score":68,"ai_readiness_score":82,"tech_stack":"cloudflare-pages","category":"infrastructure","token_bloat_ratio":11,"schema_count":3,"distance":7.089999771118164,"page_title":"Bong da 24h - Lịch thi đấu, Kết quả, BXH báo bóng đá hôm nay","h1_text":"Bong da 24h, Trang tin bong da the thao 24h cap nhat nhanh nhat"},{"domain":"wilderness.org.au","acri_score":68,"ai_readiness_score":82,"tech_stack":"cloudflare-pages","category":"infrastructure","token_bloat_ratio":3.700000047683716,"schema_count":1,"distance":8.279999756813048,"page_title":"Wilderness Society | Protecting nature and wildlife","h1_text":"Hey Bunnings: stop selling out Australia’s special forests!"},{"domain":"gfi.org","acri_score":68,"ai_readiness_score":79,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":16.5,"schema_count":1,"distance":12.439999771118163,"page_title":"Plant-based and cultivated meat innovation | GFI","h1_text":"Home"},{"domain":"storables.com","acri_score":68,"ai_readiness_score":86,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":21.5,"schema_count":1,"distance":12.560000228881837,"page_title":"Little Household Transformations for Big Happiness l Storables.com","h1_text":""},{"domain":"aisd.net","acri_score":68,"ai_readiness_score":78,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":16,"schema_count":2,"distance":13.089999771118164,"page_title":"Home » Arlington ISD","h1_text":"Home"}]}
