{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cyberproof.com","crawled_at":"2026-03-21T13:03:52.275157Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":101118,"rendered_text_length":101118,"ghost_ratio":0,"rendering_type":"SSR","word_count":5171,"li_count":68,"tr_count":0,"th_count":0,"structure_score":1.3200000524520874,"has_org_schema":true,"has_product_schema":false,"schema_count":2,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":658,"total_html_bytes":393305,"useful_text_bytes":101118,"token_bloat_ratio":3.9000000953674316,"images_total":116,"images_with_alt":105,"multimodal_pct":91,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":77354,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Threat-Led Defense | Asset, Exposure and Defense Management","meta_description":"Delivering a threat-led defense strategy offering asset estate visibility, understanding your threat exposure and optimized defenses,","logo_url":"https://www.cyberproof.com/wp-content/themes/cyberproof/resources/assets/images/favicon.ico?v=2","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":100,"sub_structure":21,"sub_schema":44,"sub_tech_stack":85,"extractability_score":62,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":57,"acri_extractability":89,"acri_semantic_structure":41,"acri_content_integrity":76,"acri_retrieval_robustness":30,"acri_grade":"C","h2_texts":"2026 Global Threat Intelligence Report | Meet CyberProof at RSAC 2026 | Defend The Threats That Matter Most! | AI-Agent + Analyst | Cloud First Security | Detect, Respond, Adapt – Everywhere | Today’s Cybersecurity Dilemma: Analyzing over 100,000 security incidents daily from more than 150 distinct threat actors | Defend Against the Threats That Matter Most | Partners | Gartner Peer Insights","tranco_rank":471399,"category":"healthcare","title_length":59,"meta_desc_length":133,"has_canonical":true,"canonical_url":"https://www.cyberproof.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":0,"h2_count":35,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Managed Detection \u0026 Response – CyberProof","og_description":"CyberProof provides expert Managed Detection \u0026 Response services so you can anticipate, adapt, and respond to cyber threats in real time.","og_image":"https://www.cyberproof.com/wp-content/uploads/2020/03/cyberproof-og.jpg","twitter_card":"summary_large_image","ttfb_ms":658,"dom_node_count":1993,"html_payload_kb":384.1,"has_hsts":true,"has_csp":false,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://www.cyberproof.com/sitemap_index.xml","internal_links":133,"external_links":16,"tracker_scripts":0,"tracker_token_pct":0,"global_score":68,"seo_pillar":54,"geo_pillar":75,"perf_pillar":52,"arch_pillar":91,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-22T12:58:54.765016Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Threat-Led Defense provides visibility, threat exposure analysis, and optimized security defenses.","target_audience":"Cybersecurity analysts, threat intelligence teams, security operations professionals","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"AI-Agent + Analyst provides advanced threat analysis and automated defense recommendations.","content_depth_score":5}},"percentile":78,"similar_domains":[{"domain":"volunteerforever.com","acri_score":80,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":4.800000190734863,"schema_count":1,"distance":4.2200000286102295,"page_title":"Best Meaningful Travel Programs Abroad | Volunteer Forever","h1_text":"Read  expert recommendations to plan your perfect meaningful trip abroad"},{"domain":"fullhires.com","acri_score":81,"ai_readiness_score":90,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":3.4000000953674316,"schema_count":3,"distance":4.25,"page_title":"FullHires – Find Your Job and even More","h1_text":"Find Your Job and even More"},{"domain":"trinityhealth.org","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":6,"schema_count":2,"distance":4.37999997138977,"page_title":"Home - Trinity Health","h1_text":"How can we help you?"},{"domain":"blogs.juniper.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":4.430000042915344,"page_title":"HPE Juniper Networking Blogs | Insights and expertise","h1_text":"Juniper Blogs"},{"domain":"cite4me.org","acri_score":80,"ai_readiness_score":87,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":2,"schema_count":3,"distance":4.520000028610229,"page_title":"College Essay Examples | Essays.io","h1_text":"College Essay Examples"}]}
