{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"endgame.com","crawled_at":"2026-03-21T10:48:30.395814Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":10433,"rendered_text_length":10982,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":1468,"li_count":57,"tr_count":0,"th_count":0,"structure_score":3.880000114440918,"has_org_schema":false,"has_product_schema":false,"schema_count":2,"tech_stack":"nextjs","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":2965,"total_html_bytes":558253,"useful_text_bytes":10433,"token_bloat_ratio":53.5,"images_total":27,"images_with_alt":13,"multimodal_pct":48,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":425576,"has_breadcrumb_schema":false,"has_faq_schema":true,"has_article_schema":false,"has_website_schema":false,"page_title":"Advanced Endpoint Security Solution | Elastic","meta_description":"Elastic Security for Endpoint stops ransomware and malware, detects advanced threats, collects host data, and streamlines investigation and response  — all with one agent....","logo_url":"https://endgame.com/favicon.ico","crawl_blocked":false,"ai_readiness_score":70,"sub_bot_access":100,"sub_rendering":99,"sub_structure":36,"sub_schema":4,"sub_tech_stack":70,"extractability_score":38,"crawl_cost_score":100,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":49,"acri_extractability":67,"acri_semantic_structure":45,"acri_content_integrity":55,"acri_retrieval_robustness":29,"acri_grade":"D","h1_text":"Endpoint security from Elastic","h2_texts":"Endpoint security and the power of XDR | Secure your endpoints — your way | Proven anti-malware | Endpoint protection validated by the best | Endpoint security for everyone | Prevent in depth | Elevate visibility and defense with XDR | Uncover hidden threats | Unmask threats, automate response | More than just endpoint protection","tranco_rank":649058,"category":"healthcare","title_length":45,"meta_desc_length":176,"has_canonical":true,"canonical_url":"https://www.elastic.co/security/endpoint-security","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":18,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Advanced Endpoint Security Solution","og_description":"Elastic Security for Endpoint stops ransomware and malware, detects advanced threats, collects host data, and streamlines investigation and response  — all with one agent....","og_image":"https://www.elastic.co/static-res/images/social_media_default.png","twitter_card":"summary_large_image","ttfb_ms":2965,"dom_node_count":744,"html_payload_kb":545.2,"has_hsts":false,"has_csp":true,"cache_control":"public, max-age=3600","sitemap_declared":false,"internal_links":52,"external_links":27,"tracker_scripts":1,"tracker_domains":"optimizely.com","tracker_token_pct":0,"global_score":56,"seo_pillar":57,"geo_pillar":61,"perf_pillar":38,"arch_pillar":64,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-30T05:56:45.763026Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Elastic Security provides comprehensive endpoint protection, including malware prevention, ransomware defense, and advanced threat detection, leveraging AI-driven security analytics and XDR capabilities.","target_audience":"Security analysts, IT administrators, cybersecurity professionals, MSPs, and organizations seeking advanced endpoint security solutions.","pricing_model":"Free tier with core features; paid subscriptions (Extended Protection) with XDR, automated response, and advanced analytics.","integration_partners":["Elastic","SOAR platforms"],"compliance_standards":["SOC 2"],"competitive_moat":"AI-powered threat detection and response, XDR capabilities, unified console, and flexible deployment options (cloud or on-premise).","content_depth_score":9,"programmatic_seo_signals":["Integration directory pages","Template comparison pages","Blog posts on XDR and threat hunting"],"key_pain_points":["Noisy alert signaling","Lack of visibility into complex threats","Difficulty correlating data from multiple sources","Manual response processes"]}},"percentile":67,"similar_domains":[{"domain":"ledspace.co.uk","acri_score":74,"ai_readiness_score":89,"tech_stack":"nextjs","category":"healthcare","token_bloat_ratio":18.799999237060547,"schema_count":4,"distance":9.75,"page_title":"LEDSpace: Evoking Envy, Hue by Hue | LED Strip Lighting Specialists","h1_text":"What do you want to light up, today?"},{"domain":"epiccarry.com","acri_score":74,"ai_readiness_score":85,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":14.100000381469727,"schema_count":2,"distance":16.75,"page_title":"Epiccarry - Boosting Service Trusted By Thousands | Secure Carries","h1_text":"Reach your gaming \n                \n                 goals today!"},{"domain":"logrhythm.com","acri_score":74,"ai_readiness_score":91,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":9.800000190734863,"schema_count":2,"distance":16.75,"page_title":"Exabeam | Cybersecurity \u0026 Compliance with Security Log Management and SIEM","h1_text":"Real Intelligence.Real Security.Real Fast."},{"domain":"revenera.com","acri_score":74,"ai_readiness_score":83,"tech_stack":"drupal","category":"healthcare","token_bloat_ratio":2.5999999046325684,"schema_count":2,"distance":16.75,"page_title":"Revenera: Modern Software Monetization, Installation, and Compliance","h1_text":"Grow Recurring Revenue.Streamline Operations.Reduce Risk."},{"domain":"marketresearchfuture.com","acri_score":74,"ai_readiness_score":83,"tech_stack":"rails","category":"healthcare","token_bloat_ratio":2.4000000953674316,"schema_count":2,"distance":16.75,"page_title":"Market Research Future - Industry Analysis Report, Business Consulting and Research","h1_text":"Analyzing\n                            \n                            \n                                \n                                \n                                    Data\n                                \n                            \n                        \n                        \n                            \n                                Synthesizing\n                            \n                            \n                                Businesses"}]}
