{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"jetico.com","crawled_at":"2026-03-18T06:29:04.243919Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":45567,"rendered_text_length":45567,"ghost_ratio":0,"rendering_type":"SSR","word_count":1412,"li_count":110,"tr_count":0,"th_count":0,"structure_score":7.789999961853027,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":1608,"total_html_bytes":240767,"useful_text_bytes":45567,"token_bloat_ratio":5.300000190734863,"images_total":32,"images_with_alt":32,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":7691,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Data Wiping \u0026 Encryption Software - Jetico","meta_description":"Jetico provides wiping and encryption software for all sensitive data throughout the lifecycle. Wipe with BCWipe \u0026 Encrypt with BestCrypt.","logo_url":"https://jetico.com/wp-content/uploads/2024/09/favicon-1-150x150.png","crawl_blocked":false,"ai_readiness_score":74,"sub_bot_access":100,"sub_rendering":100,"sub_structure":51,"sub_schema":2,"sub_tech_stack":85,"extractability_score":60,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":64,"acri_extractability":87,"acri_semantic_structure":55,"acri_content_integrity":70,"acri_retrieval_robustness":41,"acri_grade":"C","h1_text":"Complete Endpoint Data Protection","h2_texts":"Your Trusted Partner in Endpoint Data Protection | How Can We Help You Today? | Proven Expertise | Success Stories | Advanced Technology \u0026 Standards: Powering Best-in-Class Endpoint Data Protection | Patented Technologies for Industry-Leading Data Protection | Trusted Encryption with No Backdoors | Smart Automation for Optimized Data Protection | Certified \u0026 Trusted for Global Compliance | Zero-Trust Architecture","tranco_rank":380562,"category":"healthcare","title_length":42,"meta_desc_length":138,"has_canonical":true,"canonical_url":"https://jetico.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":12,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Data Wiping \u0026 Encryption Software - Jetico","og_description":"Jetico provides wiping and encryption software for all sensitive data throughout the lifecycle. Wipe with BCWipe \u0026 Encrypt with BestCrypt.","twitter_card":"summary_large_image","ttfb_ms":1608,"dom_node_count":897,"html_payload_kb":235.1,"has_hsts":true,"has_csp":true,"sitemap_declared":true,"sitemap_url":"https://jetico.com/sitemap_index.xml","internal_links":183,"external_links":4,"tracker_scripts":0,"tracker_token_pct":0,"global_score":74,"seo_pillar":67,"geo_pillar":83,"perf_pillar":47,"arch_pillar":100,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-17T23:53:28.324088Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Jetico provides data protection solutions – BestCrypt and BCWipe – for a wide range of users, from individual home users","target_audience":"Government agencies, military, national laboratories, industrial manufacturers, enterprises, home users, small businesses, cybersecurity professionals, IT administrators.","pricing_model":"Not explicitly stated, but offers a free consultation and likely tiered pricing based on features and usage.","integration_partners":["Windows","Linux","Mac","Android"],"compliance_standards":[],"competitive_moat":"30 years of experience and a focus on unbreakable security, combined with cross-platform compatibility and a long history of protecting sensitive data for high-profile clients.","content_depth_score":7,"programmatic_seo_signals":["Blog posts with titles like 'BitLocker Keys \u0026 Data Privacy', 'Immutable Backups: Why They Matter \u0026 How to Get Started'","Call to action: 'Enhance Your Data Protection Now' with a free consultation."],"key_pain_points":["Lack of explicit pricing information","Limited SEO optimization for specific features beyond blog content"]}},"percentile":78,"similar_domains":[{"domain":"volunteerforever.com","acri_score":80,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":4.800000190734863,"schema_count":1,"distance":2.55,"page_title":"Best Meaningful Travel Programs Abroad | Volunteer Forever","h1_text":"Read  expert recommendations to plan your perfect meaningful trip abroad"},{"domain":"blogs.juniper.net","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":3.3000000715255733,"page_title":"HPE Juniper Networking Blogs | Insights and expertise","h1_text":"Juniper Blogs"},{"domain":"trinityhealth.org","acri_score":82,"ai_readiness_score":90,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":6,"schema_count":2,"distance":3.4099999427795407,"page_title":"Home - Trinity Health","h1_text":"How can we help you?"},{"domain":"reliantmedicalgroup.org","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":2.5,"schema_count":1,"distance":3.5400000572204586,"page_title":"Reliant Medical Group - Central Massachusetts Healthcare","h1_text":""},{"domain":"newly-registered-domains.whoisxmlapi.com","acri_score":81,"ai_readiness_score":84,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":1.899999976158142,"schema_count":1,"distance":3.570000064373016,"page_title":"Newly Registered Domains | WhoisXML API","h1_text":"Newly Registered Domains: Find hidden business opportunities and potential threats"}]}
