{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cequence.ai","crawled_at":"2026-03-16T20:41:03.373809Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":28607,"rendered_text_length":28607,"ghost_ratio":0,"rendering_type":"SSR","word_count":3300,"li_count":222,"tr_count":0,"th_count":0,"structure_score":6.730000019073486,"has_org_schema":true,"has_product_schema":true,"schema_count":7,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":1596,"total_html_bytes":326945,"useful_text_bytes":28607,"token_bloat_ratio":11.399999618530273,"images_total":46,"images_with_alt":46,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":80486,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Advanced Application, API, and AI Protection","meta_description":"Cequence enables organizations to realize the promise of AI while defending their applications and APIs from attacks, abuse, and fraud.","crawl_blocked":false,"ai_readiness_score":87,"sub_bot_access":100,"sub_rendering":100,"sub_structure":47,"sub_schema":94,"sub_tech_stack":85,"extractability_score":71,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":71,"acri_extractability":82,"acri_semantic_structure":63,"acri_content_integrity":76,"acri_retrieval_robustness":58,"acri_grade":"B","h1_text":"API Security,  Bot Management, and AI Protection","h2_texts":"Cequence AI Gateway | Cequence Explained in 2 Minutes | Video Transcript: Cequence Security Explained in 2 Minutes | Bring the Power of Cequence Protection to Your Organization | Simple solutions targeting complex threats | Cequence Product Family | Industry Leaders Trust Cequence | Video Transcript: Ulta Beauty Customer Testimonial | Video Transcript: T-Mobile How the Industry Has Evolved | Video Transcript: Poshmark on Preventing Account Takeovers and Bot Protection","tranco_rank":483027,"category":"government","title_length":44,"meta_desc_length":135,"has_canonical":true,"canonical_url":"https://www.cequence.ai/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":12,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Cequence Security | Application, API, and AI Protection","og_description":"Cequence enables organizations to realize the promise of AI while defending their applications and APIs from attacks, abuse, and fraud.","og_image":"https://www.cequence.ai/wp-content/uploads/2023/04/CequenceThumb.jpg","twitter_card":"summary_large_image","ttfb_ms":1596,"dom_node_count":1656,"html_payload_kb":319.3,"has_hsts":true,"has_csp":true,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://www.cequence.ai/sitemap_index.xml","internal_links":209,"external_links":4,"tracker_scripts":0,"tracker_token_pct":0,"global_score":73,"seo_pillar":84,"geo_pillar":73,"perf_pillar":39,"arch_pillar":100,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-23T01:13:30.75282Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Cequence Security provides a Unified Application Protection (UAP) solution that protects APIs and web applications from attacks and fraud by","target_audience":"Security professionals, API developers, DevOps engineers, CISOs, and organizations with a significant API ecosystem.","pricing_model":"Not explicitly stated, but implied to be tiered based on usage and features, likely with a freemium option.","integration_partners":["Slack","GitHub","Jira"],"compliance_standards":[],"competitive_moat":"Patented behavioral fingerprinting technology and a comprehensive API protection lifecycle solution provide a strong differentiator against competitors.","content_depth_score":8,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["No structured FAQ schema","Thin landing pages for features"]}},"percentile":99,"similar_domains":[{"domain":"bouldercounty.org","acri_score":80,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":11.600000381469727,"schema_count":5,"distance":2.410000228881836,"page_title":"Home - Boulder County","h1_text":"Boulder County"},{"domain":"bouldercounty.gov","acri_score":80,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":11.699999809265137,"schema_count":5,"distance":2.440000057220459,"page_title":"Home - Boulder County","h1_text":"Boulder County"},{"domain":"tullylegal.com","acri_score":79,"ai_readiness_score":91,"tech_stack":"wordpress","category":"government","token_bloat_ratio":14.800000190734863,"schema_count":4,"distance":3.720000171661377,"page_title":"Commercial and Personal Lawyers | Tully Rinckey PLLC","h1_text":"Experienced Lawyers Headquartered in New York, Serving the Nation"},{"domain":"wwwilliams.com","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":10.899999618530273,"schema_count":1,"distance":4.2,"page_title":"W.W. Williams | Equipment, Diesel \u0026 Truck Repair, Service \u0026 More","h1_text":"Expanding Our California Footprint"},{"domain":"ardot.gov","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":13.5,"schema_count":1,"distance":4.680000114440918,"page_title":"Arkansas Department of Transportation","h1_text":"ARDOT Launches New Adopt-A-Highway Interactive Map"}]}
