{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"code42.com","crawled_at":"2026-03-20T08:32:34.548542Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":48274,"rendered_text_length":50815,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":1515,"li_count":111,"tr_count":0,"th_count":0,"structure_score":7.329999923706055,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"proprietary","server_header":"","cdn":"","http_status":200,"load_time_ms":718,"total_html_bytes":142642,"useful_text_bytes":48274,"token_bloat_ratio":3,"images_total":63,"images_with_alt":28,"multimodal_pct":44,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":7073,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Mimecast Incydr | See \u0026 Stop Data Loss From Insiders | Mimecast","meta_description":"Protect critical data from exposure, loss, leak and theft, while accelerating incident response times.","logo_url":"https://code42.com/sc-static/img/favicons/icons_m_192x192.png","crawl_blocked":false,"ai_readiness_score":70,"sub_bot_access":100,"sub_rendering":99,"sub_structure":49,"sub_schema":0,"sub_tech_stack":50,"extractability_score":59,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":57,"acri_extractability":84,"acri_semantic_structure":49,"acri_content_integrity":67,"acri_retrieval_robustness":29,"acri_grade":"C","h1_text":"Adaptive data protection for a changing world","h2_texts":"See \nand \nstop \ndata \nexfiltration \nfrom \nevery \nmodern \nwork \nchannel \nusing \none \nsolution. \n Optimized \nfor \nand \nby \nAI \nwith \nunmatched \nshadow \nAI \nvisibility, \nAI-powered \nrisk \nprioritization, \nand \npowerful \nagentic \nAI \nworkflows. | Gartner® Market Guide for Data Loss Prevention | Comprehensive DLP that doesn't slow innovation | Data protection that fits your organization's needs | Stay ahead of Shadow AI data leaks | Seamlessly integrates with your existing tech stack | The Human Risk Management Platform | Trusted by over 42k customers","tranco_rank":4604,"category":"infrastructure","title_length":63,"meta_desc_length":102,"has_canonical":true,"canonical_url":"https://www.mimecast.com/products/incydr/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":2,"h2_count":8,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Mimecast Incydr | See \u0026 Stop Data Loss From Insiders","og_description":"Protect critical data from exposure, loss, leak and theft, while accelerating incident response times.","ttfb_ms":718,"dom_node_count":1159,"html_payload_kb":139.3,"has_hsts":true,"has_csp":false,"cache_control":"no-store","sitemap_declared":false,"internal_links":65,"external_links":44,"tracker_scripts":0,"tracker_token_pct":0,"global_score":66,"seo_pillar":44,"geo_pillar":80,"perf_pillar":65,"arch_pillar":67,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-02-28T01:53:10.725432Z","llm_model":"mlx-community/Qwen2.5-7B-Instruct-4bit","ai_unified_analysis":{"core_offering":"Adaptive data protection against data exfiltration from modern work channels","target_audience":"Security teams, CISOs, IT engineers, VP of Security","pricing_model":"Not explicitly stated, but plans are mentioned for different organizations","integration_partners":["CrowdStrike","Palo Alto Networks Cortex XSOAR","CyberArk"],"compliance_standards":[],"competitive_moat":"Real-time monitoring, AI-powered risk prioritization, agentic AI workflows","content_depth_score":8,"programmatic_seo_signals":["Use of Incydr in customer stories","Integration with multiple security tools"],"key_pain_points":["No structured FAQ schema","Thin landing pages for features"]}},"percentile":67,"similar_domains":[{"domain":"pylonport.bandainamcomusiclive.co.jp","acri_score":82,"ai_readiness_score":86,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.799999952316284,"schema_count":1,"distance":4.310000014305115,"page_title":"PYLON PORT","h1_text":""},{"domain":"rexlondontrade.com","acri_score":82,"ai_readiness_score":86,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.700000047683716,"schema_count":2,"distance":4.839999985694885,"page_title":"Rex B2B | Gifts \u0026 homeware supplier | Trade and Wholesale","h1_text":"Wholesale gifts and homeware"},{"domain":"ciawifi.ru","acri_score":82,"ai_readiness_score":86,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.5,"schema_count":2,"distance":4.9,"page_title":"The center of identification and authentication | CiAWiFi.RU","h1_text":""},{"domain":"anatel.gov.br","acri_score":82,"ai_readiness_score":86,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.299999952316284,"schema_count":2,"distance":4.960000014305114,"page_title":"Anatel — Agência Nacional de Telecomunicações","h1_text":"Agência Nacional de Telecomunicações"},{"domain":"tophosts.net","acri_score":82,"ai_readiness_score":90,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":1.399999976158142,"schema_count":2,"distance":5.230000007152557,"page_title":"Рейтинг хостинг-провайдеров, обзоры хостингов, отзывы о хостингах","h1_text":"Честный рейтинг хостинг провайдеров"}]}
