{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"hub.illumio.com","crawled_at":"2026-03-21T06:31:46.522383Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":13169,"rendered_text_length":15493,"ghost_ratio":0.15000000596046448,"rendering_type":"Hybrid","word_count":1863,"li_count":139,"tr_count":0,"th_count":0,"structure_score":7.460000038146973,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"cloudflare-pages","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":580,"total_html_bytes":140195,"useful_text_bytes":13169,"token_bloat_ratio":10.600000381469727,"images_total":38,"images_with_alt":1,"multimodal_pct":3,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":4579,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Zero Trust Security Resources \u0026 Insights | Illumio","meta_description":"Access expert insights, trends, and resources on Zero Trust security from The Hub. Stay updated with the latest cybersecurity strategies and tools.","logo_url":"https://cdn.prod.website-files.com/66d0784a87ced402227e6e32/670d8b43debdfa4790ca88a5_Illumio_Glyph_Orange_RGB-32x32.jpg","crawl_blocked":false,"ai_readiness_score":71,"sub_bot_access":100,"sub_rendering":94,"sub_structure":50,"sub_schema":0,"sub_tech_stack":75,"extractability_score":48,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":51,"acri_extractability":66,"acri_semantic_structure":49,"acri_content_integrity":58,"acri_retrieval_robustness":29,"acri_grade":"D","h1_text":"The Zero Trust Hub","h2_texts":"Why the Containment Gap Is a Zero Trust Problem | Detection became the scoreboard | Zero Trust shifts the metric from detection to containment | Closing the containment gap | Featured Content | Zero Trust Resources | The Hub Contributors | John Kindervag | Raghu Nandakumara | Gary Barlet","category":"government","title_length":50,"meta_desc_length":147,"has_canonical":true,"canonical_url":"https://hub.illumio.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":15,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Zero Trust Security Resources \u0026 Insights | Illumio","og_description":"Access expert insights, trends, and resources on Zero Trust security from The Hub. Stay updated with the latest cybersecurity strategies and tools.","og_image":"https://cdn.prod.website-files.com/66d0784a87ced402227e6e32/691ce2ae0d478237d8b84d37_1200x630-ZTHub-SocialCard-V2.webp","twitter_card":"summary_large_image","ttfb_ms":580,"dom_node_count":1160,"html_payload_kb":136.9,"has_hsts":false,"has_csp":false,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://hub.illumio.com/sitemap.xml","internal_links":23,"external_links":152,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":62,"seo_pillar":50,"geo_pillar":69,"perf_pillar":65,"arch_pillar":60,"data_tier":0,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":70,"similar_domains":[{"domain":"globaljournals.org","acri_score":76,"ai_readiness_score":88,"tech_stack":"wordpress","category":"government","token_bloat_ratio":9.699999809265137,"schema_count":1,"distance":12.520000171661376,"page_title":"Global Journals | Peer-Reviewed International Journals","h1_text":""},{"domain":"zh-tw.tenable.com","acri_score":75,"ai_readiness_score":85,"tech_stack":"drupal","category":"government","token_bloat_ratio":6,"schema_count":1,"distance":13.480000114440918,"page_title":"曝險管理 | 雲端安全 | 弱點管理 | Tenable®","h1_text":"大規模保護 AI 的新標準"},{"domain":"info.hach.com","acri_score":75,"ai_readiness_score":86,"tech_stack":"proprietary","category":"government","token_bloat_ratio":6,"schema_count":1,"distance":13.480000114440918,"page_title":"Hach | Hach","h1_text":"Service by the People Who Know Your Instruments Best"},{"domain":"atu.ie","acri_score":76,"ai_readiness_score":87,"tech_stack":"wordpress","category":"government","token_bloat_ratio":6.400000095367432,"schema_count":1,"distance":13.510000085830688,"page_title":"Homepage - Atlantic Technological University","h1_text":"Your Future is Here"},{"domain":"itsligo.ie","acri_score":76,"ai_readiness_score":87,"tech_stack":"wordpress","category":"government","token_bloat_ratio":6.400000095367432,"schema_count":1,"distance":13.510000085830688,"page_title":"Homepage - Atlantic Technological University","h1_text":"Your Future is Here"}]}
