{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"fortifydata.com","crawled_at":"2026-03-19T07:15:53.492112Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":26515,"rendered_text_length":26515,"ghost_ratio":0,"rendering_type":"SSR","word_count":2598,"li_count":19,"tr_count":7,"th_count":3,"structure_score":1.1200000047683716,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"Apache","cdn":"","http_status":200,"load_time_ms":792,"total_html_bytes":748545,"useful_text_bytes":26515,"token_bloat_ratio":28.200000762939453,"images_total":21,"images_with_alt":11,"multimodal_pct":52,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":13473,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"#1 Cyber Risk Management Software Platform | FortifyData","meta_description":"FortifyData uncovers hidden cyber risks in internal, external assets \u0026 third parties; automates the assessment and compliance processes.","logo_url":"https://fortifydata.com/wp-content/uploads/2022/03/mark-fortify_data-150x150.png","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":100,"sub_structure":19,"sub_schema":42,"sub_tech_stack":85,"extractability_score":45,"crawl_cost_score":80,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":49,"acri_extractability":71,"acri_semantic_structure":39,"acri_content_integrity":61,"acri_retrieval_robustness":27,"acri_grade":"D","h1_text":"AI-powered Cyber Risk Management Platform for Security \u0026 Compliance Teams","h2_texts":"Automate Compliance. Accelerate Security. Reduce Risk. | Hear What Security \u0026 Compliance Leaders Are Saying | Trusted by Organizations Worldwide | Purpose-Built Cyber Risk Management Software, All in One Solution | See How We Compare | Why FortifyData? | Industries We Serve | Insights \u0026 Resources","tranco_rank":578223,"category":"social","title_length":56,"meta_desc_length":136,"has_canonical":true,"canonical_url":"https://fortifydata.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":8,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"#1 Cyber Risk Management Software Platform | FortifyData","og_description":"FortifyData uncovers hidden cyber risks in internal, external assets \u0026 third parties; automates the assessment and compliance processes.","og_image":"https://fortifydata.com/wp-content/uploads/header-image-graphic-1-1-small.png","twitter_card":"summary_large_image","ttfb_ms":792,"dom_node_count":2297,"html_payload_kb":731,"has_hsts":false,"has_csp":false,"cache_control":"max-age=0, no-cache, no-store, must-revalidate","sitemap_declared":true,"sitemap_url":"https://fortifydata.com/sitemap_index.xml","internal_links":140,"external_links":13,"tracker_scripts":0,"tracker_token_pct":0,"global_score":64,"seo_pillar":75,"geo_pillar":61,"perf_pillar":47,"arch_pillar":75,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-27T03:07:22.448647Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"FortifyData provides a platform for automating third-party risk management through AI and automation, focusing on continuous threat exposure management and autonomous risk intelligence.","target_audience":"CISOs, security managers, risk managers, and IT leaders involved in third-party risk management and cybersecurity.","pricing_model":"Not explicitly stated, but implied to be subscription-based with tiered pricing based on features and usage.","integration_partners":["Cookie Consent plugin"],"compliance_standards":[],"competitive_moat":"AI-powered autonomous risk intelligence and continuous threat exposure management, providing a more proactive and efficient approach than traditional TPRM.","content_depth_score":6,"programmatic_seo_signals":["CTEM","CAASM","CISOs"],"key_pain_points":["Traditional TPRM is process-heavy","Lack of visibility into third-party assets","Difficulty in assessing and prioritizing risks","Need for automation to streamline incident response"]}},"percentile":78,"similar_domains":[{"domain":"sexshopcy.com","acri_score":74,"ai_readiness_score":84,"tech_stack":"wordpress","category":"social","token_bloat_ratio":13.300000190734863,"schema_count":1,"distance":8.220000171661376,"page_title":"SexshopCY - Δώστε ένταση στην σεξουαλική σας ζωή","h1_text":"SUPER ΠΡΟΣΦΟΡΕΣ"},{"domain":"docs.parse.ly","acri_score":74,"ai_readiness_score":89,"tech_stack":"wordpress","category":"social","token_bloat_ratio":12.5,"schema_count":1,"distance":8.460000228881835,"page_title":"Parse.ly Help \u0026 Support Documentation","h1_text":"Parse.ly Documentation"},{"domain":"blog.berceaumagique.com","acri_score":74,"ai_readiness_score":86,"tech_stack":"wordpress","category":"social","token_bloat_ratio":11.600000381469727,"schema_count":1,"distance":8.730000114440918,"page_title":"Accueil | Le Mag Berceau Magique","h1_text":"Des conseils dédiés aux jeunes et futurs parents"},{"domain":"megamaxi.com","acri_score":74,"ai_readiness_score":86,"tech_stack":"wordpress","category":"social","token_bloat_ratio":7.400000095367432,"schema_count":1,"distance":8.75,"page_title":"Catálogo de productos y beneficios lo encuentras en Megamaxi","h1_text":""},{"domain":"rosen-zu.net","acri_score":74,"ai_readiness_score":84,"tech_stack":"wordpress","category":"social","token_bloat_ratio":6,"schema_count":1,"distance":8.75,"page_title":"路線図ネット | 全国の路線図、停車駅が分かるサイト","h1_text":"路線図ネット"}]}
