{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"judysecurity.ai","crawled_at":"2026-03-21T08:37:48.348738Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":8303,"rendered_text_length":9226,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":1172,"li_count":0,"tr_count":0,"th_count":0,"structure_score":0,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"webflow","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":778,"total_html_bytes":77670,"useful_text_bytes":8303,"token_bloat_ratio":9.399999618530273,"images_total":107,"images_with_alt":10,"multimodal_pct":9,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":529,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Judy Security","meta_description":"We believe that every company deserves affordable cybersecurity protection, no matter their size and budget. That’s why we designed Judy to meet the unique needs of SMBs.","logo_url":"https://cdn.prod.website-files.com/65f9c8c42e34897f931cc72d/6615cf8e653508b1686ec35a_Favicon.png","crawl_blocked":false,"ai_readiness_score":62,"sub_bot_access":100,"sub_rendering":97,"sub_structure":0,"sub_schema":0,"sub_tech_stack":75,"extractability_score":35,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":34,"acri_extractability":70,"acri_semantic_structure":20,"acri_content_integrity":59,"acri_retrieval_robustness":10,"acri_grade":"F","h1_text":"Safeguarding Your Clients’ Business with \nSimplicity and Strength","h2_texts":"Multi-Factor Authentication | Single-Sign On | Passwordless | EndpointProtection | AI | DNS Filtering | SIEM \u0026 MDR/XDR | Compliance | Security Training | Email Protection","tranco_rank":903169,"category":"government","title_length":13,"meta_desc_length":172,"has_canonical":false,"canonical_mismatch":false,"has_meta_viewport":true,"h1_count":12,"h2_count":10,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Judy Security","og_description":"We believe that every company deserves affordable cybersecurity protection, no matter their size and budget. That’s why we designed Judy to meet the unique needs of SMBs.","og_image":"https://cdn.prod.website-files.com/65f9c8c42e34897f931cc72d/663132184f75eed45dad27cb_Judy%20Security.png","twitter_card":"summary_large_image","ttfb_ms":778,"dom_node_count":659,"html_payload_kb":75.8,"has_hsts":true,"has_csp":true,"cf_cache_status":"HIT","sitemap_declared":true,"sitemap_url":"https://judysecurity.ai/sitemap.xml","internal_links":40,"external_links":10,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":62,"seo_pillar":33,"geo_pillar":67,"perf_pillar":74,"arch_pillar":80,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":false},"percentile":51,"similar_domains":[{"domain":"ndc.go.ke","acri_score":59,"ai_readiness_score":76,"tech_stack":"wordpress","category":"government","token_bloat_ratio":9.399999618530273,"schema_count":0,"distance":11.75,"page_title":"National Defence College","h1_text":""},{"domain":"firstmid.com","acri_score":59,"ai_readiness_score":73,"tech_stack":"express","category":"government","token_bloat_ratio":11.199999809265137,"schema_count":0,"distance":12.290000057220459,"page_title":"Home | First Mid Bank \u0026 Trust","h1_text":"First Mid Bank \u0026 Trust"},{"domain":"basgov.com","acri_score":59,"ai_readiness_score":72,"tech_stack":"wordpress","category":"government","token_bloat_ratio":9.199999809265137,"schema_count":1,"distance":12.309999942779541,"page_title":"Home - Edmunds GovTech : Local Government Software","h1_text":""},{"domain":"keesingtechnologies.com","acri_score":59,"ai_readiness_score":77,"tech_stack":"wordpress","category":"government","token_bloat_ratio":9,"schema_count":1,"distance":12.369999885559082,"page_title":"Identity verification you can trust - Keesing Technologies","h1_text":"Preventing ID Fraud Starts with Keesing Identity Verification Solutions"},{"domain":"raleighnc.gov","acri_score":59,"ai_readiness_score":74,"tech_stack":"drupal","category":"government","token_bloat_ratio":7.300000190734863,"schema_count":0,"distance":12.379999828338622,"page_title":"RaleighNC.gov | Raleighnc.gov","h1_text":"Welcome to Raleigh!"}]}
