{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"isdecisions.com","crawled_at":"2026-03-19T11:35:18.713705Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":3722,"rendered_text_length":3918,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":556,"li_count":56,"tr_count":0,"th_count":0,"structure_score":10.069999694824219,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"nextjs","server_header":"","cdn":"","http_status":200,"load_time_ms":1114,"total_html_bytes":195649,"useful_text_bytes":3722,"token_bloat_ratio":52.599998474121094,"images_total":26,"images_with_alt":16,"multimodal_pct":62,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":129626,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"IS Decisions | Active Directory Access Security Software","meta_description":"Active Directory access security software to protect every login and track file access. Over two decades of AD access security, trusted by IT pros worldwide.","logo_url":"https://isdecisions.com/favicon.ico","crawl_blocked":false,"ai_readiness_score":73,"sub_bot_access":100,"sub_rendering":99,"sub_structure":58,"sub_schema":0,"sub_tech_stack":70,"extractability_score":44,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":46,"acri_extractability":68,"acri_semantic_structure":54,"acri_content_integrity":27,"acri_retrieval_robustness":34,"acri_grade":"D","h1_text":"Solve the Active Directory access security challenges you face every day","h2_texts":"UserLock | FileAudit | Our solutions integrate with your existing AD environment | Here’s what our clients have to say | Ready to put security where it matters most?","tranco_rank":596045,"category":"education","title_length":56,"meta_desc_length":157,"has_canonical":true,"canonical_url":"https://www.isdecisions.com","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":5,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"IS Decisions | Active Directory Access Security Software","og_description":"Active Directory access security software to protect every login and track file access. Over two decades of AD access security, trusted by IT pros worldwide.","og_image":"https://www.isdecisions.com/en/opengraph-image?7905feaca92e54df","twitter_card":"summary","ttfb_ms":1114,"dom_node_count":512,"html_payload_kb":191.1,"has_hsts":true,"has_csp":true,"cache_control":"public, max-age=0, must-revalidate","sitemap_declared":false,"internal_links":48,"external_links":0,"tracker_scripts":0,"tracker_token_pct":0,"global_score":60,"seo_pillar":50,"geo_pillar":60,"perf_pillar":56,"arch_pillar":80,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":296057,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-27T22:27:04.638014Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"UserLock and FileAudit provide Active Directory access security and file activity monitoring solutions.","target_audience":"IT admins, security analysts, information security analysts, system administrators, file auditors, and business managers.","pricing_model":"Free trial, with potential for tiered pricing based on features and usage.","integration_partners":[],"compliance_standards":["SOC 2"],"competitive_moat":"Simplified Active Directory security and file auditing with real-time monitoring and user-friendly interfaces.","content_depth_score":6,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["Thin landing pages for features"]}},"percentile":75,"similar_domains":[{"domain":"shu.edu","acri_score":71,"ai_readiness_score":81,"tech_stack":"cloudflare-pages","category":"education","token_bloat_ratio":3.4000000953674316,"schema_count":0,"distance":16.75,"page_title":"Seton Hall University (SHU) - Seton Hall University","h1_text":"Where Leadership Meets Sustainability"},{"domain":"jade-hs.de","acri_score":71,"ai_readiness_score":80,"tech_stack":"typo3","category":"education","token_bloat_ratio":2.200000047683716,"schema_count":0,"distance":16.75,"page_title":"Jade Hochschule - Jade Hochschule","h1_text":"Besser studieren - Jade Hochschule"},{"domain":"security.gallagher.com","acri_score":71,"ai_readiness_score":79,"tech_stack":"sitecore","category":"education","token_bloat_ratio":1.899999976158142,"schema_count":0,"distance":16.75,"page_title":"Gallagher Security - Solutions for Every Industry","h1_text":"World leading security.\nBuilt with you in mind."},{"domain":"oyp.medeniyet.edu.tr","acri_score":71,"ai_readiness_score":80,"tech_stack":"proprietary","category":"education","token_bloat_ratio":2.799999952316284,"schema_count":0,"distance":16.75,"page_title":"Ana Sayfa","h1_text":"Öğretim Üyesi Yetiştirme Programı Koordinatörlüğü"},{"domain":"petermac.org","acri_score":71,"ai_readiness_score":79,"tech_stack":"joomla","category":"education","token_bloat_ratio":2.9000000953674316,"schema_count":0,"distance":16.75,"page_title":"Home - Peter MacCallum Cancer Centre","h1_text":"We care for people affected by cancer"}]}
