{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"mutare.com","crawled_at":"2026-03-21T13:25:00.308219Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":5963,"rendered_text_length":5963,"ghost_ratio":0,"rendering_type":"SSR","word_count":862,"li_count":30,"tr_count":0,"th_count":0,"structure_score":3.4800000190734863,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":548,"total_html_bytes":280762,"useful_text_bytes":5963,"token_bloat_ratio":47.099998474121094,"images_total":24,"images_with_alt":0,"multimodal_pct":0,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":12439,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Mutare - The Authority in Voice Security - Mutare","logo_url":"https://www.mutare.com/wp-content/uploads/2020/01/cropped-Mutare_favicon-32x32.png","crawl_blocked":false,"ai_readiness_score":71,"sub_bot_access":100,"sub_rendering":100,"sub_structure":34,"sub_schema":2,"sub_tech_stack":85,"extractability_score":38,"crawl_cost_score":65,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":48,"acri_extractability":62,"acri_semantic_structure":46,"acri_content_integrity":50,"acri_retrieval_robustness":31,"acri_grade":"D","h1_text":"Enterprise-Class Protection \u0026 Defense for your Voice Channel","h2_texts":"THE AUTHORITY IN VOICE SECURITY | The Voice Channel is Under Attack | Is Voice a Gap in your Security Strategy? | Top Voice-Based Threats | The Solution for Voice Security | Simple, Robust, Immediate | Enterprise-Class Voice Security for your entire voice technology stack | ANATOMY | A Robust Multi-Layered Approach | Intentionally Designed for the Enterprise","tranco_rank":463819,"category":"healthcare","title_length":49,"meta_desc_length":0,"has_canonical":true,"canonical_url":"https://www.mutare.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":20,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Mutare - The Authority in Voice Security - Mutare","twitter_card":"summary_large_image","ttfb_ms":548,"dom_node_count":723,"html_payload_kb":274.2,"has_hsts":false,"has_csp":true,"sitemap_declared":true,"sitemap_url":"https://www.mutare.com/sitemap_index.xml","internal_links":48,"external_links":3,"tracker_scripts":4,"tracker_domains":"googletagmanager.com | js.hs-scripts.com","tracker_token_pct":0,"global_score":62,"seo_pillar":51,"geo_pillar":61,"perf_pillar":68,"arch_pillar":73,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-22T04:09:46.526739Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Mutare provides a voice security platform that helps organizations detect and prevent voice-based attacks, including vishing, callback fraud, and GenAI-powered","target_audience":"Security analysts, cybersecurity professionals, IT managers, contact center managers, compliance officers, and executives concerned about voice-based fraud and data breaches.","pricing_model":"Subscription-based, with tiered pricing based on features and number of users. Pricing not explicitly stated in text.","integration_partners":["Group iB","Keepnet"],"compliance_standards":["SOC 2"],"competitive_moat":"AI-powered threat detection and real-time resource optimization for voice security, combined with a deep understanding of voice-based attack techniques.","content_depth_score":6,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features","Insufficient native collaboration tool security","Difficulty addressing new threats from GenAI technology"]}},"percentile":70,"similar_domains":[{"domain":"gbs-cidp.org","acri_score":73,"ai_readiness_score":86,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":10.399999618530273,"schema_count":1,"distance":8.75,"page_title":"Home - GBS/CIDP Foundation International","h1_text":"GBS/CIDP Foundation International"},{"domain":"data-index.co.jp","acri_score":73,"ai_readiness_score":84,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":3.799999952316284,"schema_count":1,"distance":8.75,"page_title":"情報を通じて医療・ヘルスケアを支える データインデックス株式会社 - データインデックス","h1_text":"情報を通じて医療・ヘルスケアを支える"},{"domain":"merit.com","acri_score":73,"ai_readiness_score":85,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":8.399999618530273,"schema_count":1,"distance":8.75,"page_title":"Merit Medical - A Global Leader in the Medical Device Industry","h1_text":"An introduction to Merit Medical"},{"domain":"natera.com","acri_score":73,"ai_readiness_score":87,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":16.700000762939453,"schema_count":1,"distance":8.75,"page_title":"Natera: A global leader in cell-free DNA testing","h1_text":"Protect Health and Inform Earlier, More Targeted Interventions"},{"domain":"healthcaresnapshots.com","acri_score":73,"ai_readiness_score":81,"tech_stack":"wordpress","category":"healthcare","token_bloat_ratio":2.299999952316284,"schema_count":1,"distance":8.75,"page_title":"Healthcare Snapshots - Discover Worldwide Healthcare Design","h1_text":""}]}
