{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"enginsight.com","crawled_at":"2026-03-20T20:51:17.37463Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":37749,"rendered_text_length":37749,"ghost_ratio":0,"rendering_type":"SSR","word_count":1458,"li_count":248,"tr_count":0,"th_count":0,"structure_score":17.010000228881836,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":2552,"total_html_bytes":355643,"useful_text_bytes":37749,"token_bloat_ratio":9.399999618530273,"images_total":37,"images_with_alt":18,"multimodal_pct":49,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":25983,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":true,"has_website_schema":true,"page_title":"Enginsight: Die Cybersecurity-Plattform für Ihre IT","meta_description":"Cybersecurity für den Mittelstand. Mit Automatisierung \u0026 KI mehr Sicherheit für Ihre IT: Monitoring, Pentesting, Inventarisierung, ISMS und mehr für Server und Clients.","logo_url":"https://enginsight.com/wp-content/uploads/2018/06/cropped-favicon-32x32.png","crawl_blocked":false,"ai_readiness_score":85,"sub_bot_access":100,"sub_rendering":100,"sub_structure":75,"sub_schema":42,"sub_tech_stack":85,"extractability_score":69,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":71,"acri_extractability":78,"acri_semantic_structure":73,"acri_content_integrity":69,"acri_retrieval_robustness":61,"acri_grade":"B","h1_text":"100% Souveräne Cybersecurity Angriff \u0026 Verteidigung in einer Plattform","h2_texts":"IT-Inventarisierung | IT-Security Analyse von innen | IT-Security Analyse von außen | Security-Prozesse automatisieren | Automatischer Penetrationstest | Enginsight Produktvarianten","tranco_rank":210109,"category":"infrastructure","title_length":52,"meta_desc_length":171,"has_canonical":true,"canonical_url":"https://enginsight.com/de/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":6,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"de-DE","og_title":"Enginsight: Die Cybersecurity-Plattform für Ihre IT","og_description":"Cybersecurity für den Mittelstand. Mit Automatisierung \u0026 KI mehr Sicherheit für Ihre IT: Monitoring, Pentesting, Inventarisierung, ISMS und mehr für Server und Clients.","og_image":"https://enginsight.com/wp-content/uploads/2022/06/Logo2-1.png","twitter_card":"summary_large_image","ttfb_ms":2552,"dom_node_count":1974,"html_payload_kb":347.3,"has_hsts":true,"has_csp":false,"sitemap_declared":true,"sitemap_url":"https://enginsight.com/de/sitemap_index.xml","internal_links":225,"external_links":6,"tracker_scripts":0,"tracker_token_pct":0,"global_score":71,"seo_pillar":74,"geo_pillar":86,"perf_pillar":27,"arch_pillar":84,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":268782,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":10,"llm_analyzed":true,"llm_analyzed_at":"2026-03-10T14:40:13.319597Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Enginsight’s Cybersecurity Blog provides IT security news, trends, and best practices for businesses, focusing on threat intelligence and vulnerability management.","target_audience":"IT security professionals, CISOs, system administrators, cybersecurity analysts, and IT managers.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Deep threat intelligence and CVE analysis, combined with a focus on practical solutions and partner integrations.","content_depth_score":5,"programmatic_seo_signals":["Use-cases","Security","Datenschutz","Endpoint \u0026 Netzwerksicherheit","Anwendungsfälle \u0026 Best Practices","CVE-Erkennung"],"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features","Need for comprehensive vulnerability analysis"]}},"percentile":98,"similar_domains":[{"domain":"profitserver.net","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.799999952316284,"schema_count":2,"distance":4.429999899864197,"page_title":"Rent VPS from $1.9/mo. Unlimited, full root. 24/7 support. Virtual Private Server. VPS Hosting Plans.","h1_text":"Rent virtual VPS server"},{"domain":"driphydration.com","acri_score":86,"ai_readiness_score":95,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.899999976158142,"schema_count":2,"distance":4.999999892711639,"page_title":"Drip Hydration - IV Therapy \u0026 Mobile Wellness","h1_text":"The Global Leader in Mobile IV Therapy"},{"domain":"grupocasalima.com","acri_score":87,"ai_readiness_score":96,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":11.399999618530273,"schema_count":5,"distance":5,"page_title":"E-COMMERCE CASA LIMA: Productos \u0026 Servicios al PERÚ ✔️","h1_text":"E-COMMERCE CASA LIMA"},{"domain":"safely.co.jp","acri_score":90,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.899999976158142,"schema_count":3,"distance":6.099999892711639,"page_title":"【公式】セーフリー｜口コミ比較で失敗しない、安心の業者選びを提供します。","h1_text":""},{"domain":"hi-ad.jp","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.0999999046325684,"schema_count":5,"distance":6.139999914169311,"page_title":"販促花子|ノベルティ・販促品・名入れ・記念品のオリジナルグッズ印刷・制作","h1_text":"ノベルティ・販促品・記念品の名入れなら販促花子|激安コミコミ価格・高品質・小ロット・最短翌日発送"}]}
