{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"jetstack.io","crawled_at":"2026-03-18T22:38:09.445413Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":7317,"rendered_text_length":7317,"ghost_ratio":0,"rendering_type":"SSR","word_count":730,"li_count":194,"tr_count":0,"th_count":0,"structure_score":26.579999923706055,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":547,"total_html_bytes":247814,"useful_text_bytes":7317,"token_bloat_ratio":33.900001525878906,"images_total":15,"images_with_alt":15,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":12886,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Cloud Native Consulting | CyberArk","meta_description":"Optimize your cloud native projects with strategic consulting, field engineering and training to help you make the most of Kubernetes and OpenShift modernization.","logo_url":"https://jetstack.io/favicon-48x48.png","crawl_blocked":false,"ai_readiness_score":89,"sub_bot_access":100,"sub_rendering":100,"sub_structure":94,"sub_schema":42,"sub_tech_stack":85,"extractability_score":67,"crawl_cost_score":65,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":69,"acri_extractability":75,"acri_semantic_structure":84,"acri_content_integrity":46,"acri_retrieval_robustness":72,"acri_grade":"C","h1_text":"Cloud native expertise and consulting services","h2_texts":"Optimize your cloud native projects with strategic consulting, field engineering and training to help you make the most of Kubernetes and OpenShift modernization. | Strategic support to accelerate your cloud native security \u0026 optimization","tranco_rank":46556,"category":"finance","title_length":34,"meta_desc_length":162,"has_canonical":true,"canonical_url":"https://www.cyberark.com/services-support/cloud-native-consulting/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":2,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Cloud Native Consulting","og_description":"Optimize your cloud native projects with strategic consulting, field engineering and training to help you make the most of Kubernetes and OpenShift modernization.","og_image":"https://www.cyberark.com/wp-content/uploads/2025/01/double-quotes.svg","twitter_card":"summary_large_image","ttfb_ms":547,"dom_node_count":944,"html_payload_kb":242,"has_hsts":true,"has_csp":true,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":false,"internal_links":1,"external_links":146,"tracker_scripts":0,"tracker_token_pct":0,"global_score":69,"seo_pillar":74,"geo_pillar":70,"perf_pillar":59,"arch_pillar":73,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":96639,"ai_trust_percentile":0,"inbound_ai_links":1,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-02T17:08:10.365348Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"CyberArk secures every identity with the right level of privilege controls, protecting organizations from identity-related breaches and enabling secure innovation.","target_audience":"CISOs, Security Architects, IT Directors, DevOps Engineers, Security Operations Teams","pricing_model":"Subscription-based pricing with tiered plans based on features and user count. Contact for custom pricing.","integration_partners":["Slack","GitHub","Jira","AWS","Azure"],"compliance_standards":["SOC 2","GDPR"],"competitive_moat":"Unique foundation in privileged access management combined with AI-powered adaptive privilege controls and a unified platform.","content_depth_score":8,"programmatic_seo_signals":["Integration directory pages","Template comparison pages","Blog posts on identity security","Case studies demonstrating security benefits"],"key_pain_points":["Identity-related breaches","Lack of visibility into user access","Complex access management processes","Difficulty enforcing least privilege","Compliance challenges"]}},"percentile":99,"similar_domains":[{"domain":"digitalnewstoday.in","acri_score":78,"ai_readiness_score":82,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":4.599999904632568,"schema_count":1,"distance":6.35,"page_title":"Digital News Today – Breaking News, World Updates \u0026 Live Stories","h1_text":"digitalnewstoday"},{"domain":"trustonefinancial.org","acri_score":78,"ai_readiness_score":89,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":7,"schema_count":1,"distance":6.35,"page_title":"Home - TruStone Financial CU","h1_text":"Your Backyard: Upgraded."},{"domain":"vogate.com","acri_score":79,"ai_readiness_score":84,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":6.5,"page_title":"Find a World of Knowledge and Learning with Vogate","h1_text":"Best Selling Products"},{"domain":"bbkonline.com","acri_score":81,"ai_readiness_score":88,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":2.200000047683716,"schema_count":1,"distance":6.8,"page_title":"BBK | Bank of Bahrain and Kuwait","h1_text":"Digitally driven, expertly curated"},{"domain":"yolo.io","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":2.799999952316284,"schema_count":1,"distance":6.95,"page_title":"Yolo Investments","h1_text":"make a difference"}]}
