{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"cyrisma.com","crawled_at":"2026-03-16T04:06:52.402211Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":5945,"rendered_text_length":6606,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":802,"li_count":0,"tr_count":0,"th_count":0,"structure_score":0,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"hubspot","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":539,"total_html_bytes":72663,"useful_text_bytes":5945,"token_bloat_ratio":12.199999809265137,"images_total":61,"images_with_alt":29,"multimodal_pct":48,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":7395,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Cyrisma - Identify and Reduce Cyber Risk","meta_description":"Empower your MSP with Cyrisma - the unified cybersecurity platform for vulnerability management, asset tracking, compliance, data classification, and vCISO services.","logo_url":"https://cdn.prod.website-files.com/68b7eccce69a3b4bf0566aa7/68c15f2a6217b4b0bbe0e906_32.png","crawl_blocked":false,"ai_readiness_score":61,"sub_bot_access":100,"sub_rendering":97,"sub_structure":0,"sub_schema":0,"sub_tech_stack":70,"extractability_score":32,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":32,"acri_extractability":72,"acri_semantic_structure":20,"acri_content_integrity":47,"acri_retrieval_robustness":10,"acri_grade":"F","h1_text":"The one platform for MSPs to identify and reduce cyber risk​","h2_texts":"Manage cyber risk from end-to-end | Users love us | Trusted by security leaders | Resources | Automated Vulnerability Remediation Best Practices | Vulnerability Management Automation Best Practices | Vulnerability Prioritization Best Practices | Turn Risk and Compliance Into Revenue | Frequently asked questions","tranco_rank":43644,"category":"infrastructure","title_length":40,"meta_desc_length":165,"has_canonical":true,"canonical_url":"https://www.cyrisma.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":9,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Cyrisma - Identify and Reduce Cyber Risk","og_description":"Empower your MSP with Cyrisma - the unified cybersecurity platform for vulnerability management, asset tracking, compliance, data classification, and vCISO services.","og_image":"https://cdn.prod.website-files.com/68b7eccce69a3b4bf0566aa7/68ca920cd45d9a0f75bb4eec_c4c2f866a84cdcc30cf9b9ce38e4478a_OG%20Image%20-%20Home.png","twitter_card":"summary_large_image","ttfb_ms":539,"dom_node_count":617,"html_payload_kb":71,"has_hsts":true,"has_csp":true,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://www.cyrisma.com/sitemap.xml","internal_links":64,"external_links":7,"tracker_scripts":2,"tracker_domains":"googletagmanager.com | js.hs-scripts.com","tracker_token_pct":0,"global_score":63,"seo_pillar":49,"geo_pillar":58,"perf_pillar":74,"arch_pillar":86,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":49,"similar_domains":[{"domain":"emmanoah.de","acri_score":57,"ai_readiness_score":74,"tech_stack":"shopify","category":"infrastructure","token_bloat_ratio":10.899999618530273,"schema_count":0,"distance":12.140000057220458,"page_title":"emma \u0026 noah | Nur das Beste für Dein Baby | Baby Online-Shop","h1_text":"emma \u0026 noah"},{"domain":"i10audio.com","acri_score":57,"ai_readiness_score":72,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":10.699999809265137,"schema_count":0,"distance":12.2,"page_title":"Discover","h1_text":""},{"domain":"ip6net.net","acri_score":57,"ai_readiness_score":74,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":12.899999618530273,"schema_count":1,"distance":12.459999942779541,"page_title":"IP6net Ltd - IP6net","h1_text":""},{"domain":"stcs.com.sa","acri_score":57,"ai_readiness_score":82,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":16.100000381469727,"schema_count":0,"distance":12.920000171661377,"page_title":"solutions by stc","h1_text":"IT Services Provider to Saudi Arabia’s leading companies"},{"domain":"vailvalleyanglers.com","acri_score":57,"ai_readiness_score":74,"tech_stack":"shopify","category":"infrastructure","token_bloat_ratio":8,"schema_count":0,"distance":13.00999994277954,"page_title":"Vail Valley Anglers | Fly Shop \u0026 Guide Service – VAIL VALLEY ANGLERS","h1_text":"VAIL VALLEY ANGLERS"}]}
