{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"iansresearch.com","crawled_at":"2026-03-15T22:51:22.273432Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":38471,"rendered_text_length":42746,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":1192,"li_count":170,"tr_count":0,"th_count":0,"structure_score":14.260000228881836,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"hubspot","server_header":"","cdn":"","http_status":200,"load_time_ms":637,"total_html_bytes":108333,"useful_text_bytes":38471,"token_bloat_ratio":2.799999952316284,"images_total":83,"images_with_alt":50,"multimodal_pct":60,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":7719,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Cybersecurity Insights \u0026 CISO Guidance | IANS Research","meta_description":"IANS Research provides guidance and actionable advice from renowned information security practitioners to help CISOs and their teams make informed decisions.","logo_url":"https://cdn.iansresearch.com/favicons/favicon.ico","crawl_blocked":false,"ai_readiness_score":81,"sub_bot_access":100,"sub_rendering":97,"sub_structure":69,"sub_schema":42,"sub_tech_stack":70,"extractability_score":75,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":68,"acri_extractability":84,"acri_semantic_structure":64,"acri_content_integrity":71,"acri_retrieval_robustness":47,"acri_grade":"C","h1_text":"Guidance from 150+ cybersecurity experts. We're always in your corner.","h2_texts":"Act faster and make better decisions to move your business forward | 2026 State of the CISO Snapshot Report | Expand your team with on-demand expertise | Achieve your priorities with our services | Featured Resources | Get 150+ cybersecurity experts in your corner","tranco_rank":507208,"category":"infrastructure","title_length":54,"meta_desc_length":157,"has_canonical":true,"canonical_url":"https://www.iansresearch.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":6,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"2026 State of the CISO - Reports \u0026amp; Insights Page","og_description":"\u003cp\u003eThe CISO role continues to grow in importance, complexity, and scope of responsibilities.\u0026nbsp;Navigate the evolving scope of the CISO role with benchmark data, market trends, and insights from a survey of over 600 CISOs.\u003c/p\u003e","ttfb_ms":637,"dom_node_count":842,"html_payload_kb":105.8,"has_hsts":false,"has_csp":false,"cache_control":"no-cache","sitemap_declared":true,"sitemap_url":"https://www.iansresearch.com/sitemap/sitemap-index.xml","internal_links":126,"external_links":4,"tracker_scripts":1,"tracker_domains":"js.hs-scripts.com","tracker_token_pct":0,"global_score":73,"seo_pillar":58,"geo_pillar":85,"perf_pillar":65,"arch_pillar":76,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-24T03:38:04.963707Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":" IANS provides cybersecurity research, expert guidance, executive coaching, and training to CISOs and their teams, enabling them to make informed security decisions and mitigate risks.","target_audience":"CISOs, cybersecurity leaders, IT executives, and security professionals within Fortune 100 companies and government organizations.","pricing_model":"Subscription-based, with tiered access to research, expert guidance, and training programs. Pricing not explicitly stated, but likely based on the level of Faculty access and services utilized.","integration_partners":["AWS"],"compliance_standards":[],"competitive_moat":"Deep expertise of a team of practicing cybersecurity experts (Faculty) combined with unbiased research and actionable guidance, differentiating from vendor-driven solutions.","content_depth_score":8,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["No structured FAQ schema","Thin landing pages for features"]}},"percentile":95,"similar_domains":[{"domain":"driphydration.com","acri_score":86,"ai_readiness_score":95,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.899999976158142,"schema_count":2,"distance":11.469999992847441,"page_title":"Drip Hydration - IV Therapy \u0026 Mobile Wellness","h1_text":"The Global Leader in Mobile IV Therapy"},{"domain":"profitserver.net","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.799999952316284,"schema_count":2,"distance":11.5,"page_title":"Rent VPS from $1.9/mo. Unlimited, full root. 24/7 support. Virtual Private Server. VPS Hosting Plans.","h1_text":"Rent virtual VPS server"},{"domain":"symbolonly.com","acri_score":86,"ai_readiness_score":89,"tech_stack":"cloudflare-pages","category":"infrastructure","token_bloat_ratio":2.4000000953674316,"schema_count":3,"distance":11.819999957084654,"page_title":"Copy and Paste Symbols - Cool Text Symbols - Symbolonly.com","h1_text":"Copy and Paste Symbols"},{"domain":"kondela.hu","acri_score":86,"ai_readiness_score":93,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":3.0999999046325684,"schema_count":4,"distance":12.289999985694884,"page_title":"Bútorok és otthoni kiegészítők | Kondela.hu","h1_text":""},{"domain":"decathlon.qa","acri_score":86,"ai_readiness_score":89,"tech_stack":"shopify","category":"infrastructure","token_bloat_ratio":2.299999952316284,"schema_count":4,"distance":12.35,"page_title":"Shop Sports Gear and Equipment Online – Decathlon Qatar","h1_text":"Decathlon Qatar"}]}
