{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"pentasecurity.com","crawled_at":"2026-03-14T17:09:55.231458Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":35961,"rendered_text_length":35961,"ghost_ratio":0,"rendering_type":"SSR","word_count":1751,"li_count":67,"tr_count":0,"th_count":0,"structure_score":3.8299999237060547,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"","cdn":"","http_status":200,"load_time_ms":3053,"total_html_bytes":479897,"useful_text_bytes":35961,"token_bloat_ratio":13.300000190734863,"images_total":12,"images_with_alt":11,"multimodal_pct":92,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":224569,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Home | Penta Security Inc.","meta_description":"Secure All Essential Enterprise Operations with Penta Security's WAAP(WAF), Encryption, Authentication, Blockchain, and IoT Security Solutions","logo_url":"https://www.pentasecurity.com/wp-content/uploads/2020/02/favicon.png","crawl_blocked":false,"ai_readiness_score":71,"sub_bot_access":100,"sub_rendering":100,"sub_structure":36,"sub_schema":2,"sub_tech_stack":85,"extractability_score":44,"crawl_cost_score":65,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":52,"acri_extractability":80,"acri_semantic_structure":44,"acri_content_integrity":60,"acri_retrieval_robustness":27,"acri_grade":"D","h1_text":"TRUST FOR OPEN SOCIETY","h2_texts":"CVE vs GCVE: How Vulnerability Identification Is Evolving | Ericsson US Discloses Data Breach Impacting 15,000 Individuals | AI Content Generation Systems Face Cybersecurity Risks | Global Outreach Organization, “Beyonders” Launched by Penta Security | Why Native Cloud Security Falls Short | Penta Security Obtains PCI DSS v4.0.1 as a Service Provider | Secure First, Then Connect | Optimized For Your Environment | Want to Learn More?","tranco_rank":688169,"category":"social","title_length":26,"meta_desc_length":142,"has_canonical":true,"canonical_url":"https://www.pentasecurity.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":9,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Home | Penta Security Inc.","og_description":"Secure All Essential Enterprise Operations with Penta Security's WAAP(WAF), Encryption, Authentication, Blockchain, and IoT Security Solutions","og_image":"https://www.pentasecurity.com/wp-content/uploads/2020/07/Penta-Security-Main-Page.png","twitter_card":"summary_large_image","ttfb_ms":3053,"dom_node_count":1805,"html_payload_kb":468.6,"has_hsts":false,"has_csp":false,"cache_control":"max-age=2592000","sitemap_declared":false,"internal_links":101,"external_links":6,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":58,"seo_pillar":58,"geo_pillar":70,"perf_pillar":27,"arch_pillar":68,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-04-01T01:03:09.468866Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Penta Security provides a cloud web application firewall (WAF) and related security solutions to protect websites and applications from cyberattacks,","target_audience":"Government agencies, financial institutions, enterprises, and other organizations requiring robust cybersecurity solutions.","pricing_model":"Information not explicitly stated, likely tiered based on features and usage.","integration_partners":["AWS Activate"],"compliance_standards":[],"competitive_moat":"Deep threat intelligence, global presence, and a focus on securing open society infrastructure, combined with a strong track record in Japan.","content_depth_score":7,"programmatic_seo_signals":["Blog posts on various cybersecurity topics (ATO, email threats, ransomware, etc.)","Press releases highlighting company achievements and partnerships","Infographic requests for various cybersecurity topics"],"key_pain_points":["Lack of explicit pricing information","Limited information on specific features beyond WAF"]}},"percentile":70,"similar_domains":[{"domain":"digitalreviews.net","acri_score":77,"ai_readiness_score":90,"tech_stack":"wordpress","category":"social","token_bloat_ratio":13.600000381469727,"schema_count":1,"distance":3.840000057220459,"page_title":"Digital Reviews Network - Your Tech; Our XP","h1_text":""},{"domain":"blog.taxbandits.com","acri_score":77,"ai_readiness_score":90,"tech_stack":"wordpress","category":"social","token_bloat_ratio":11.100000381469727,"schema_count":1,"distance":4.409999942779541,"page_title":"Blog - TaxBandits","h1_text":"Blog - TaxBandits"},{"domain":"cleopatraceramics.com","acri_score":77,"ai_readiness_score":90,"tech_stack":"wordpress","category":"social","token_bloat_ratio":10.199999809265137,"schema_count":1,"distance":4.680000114440918,"page_title":"Home Page | Ceramica Cleopatra Group","h1_text":""},{"domain":"dmit.co.th","acri_score":77,"ai_readiness_score":89,"tech_stack":"wordpress","category":"social","token_bloat_ratio":9.600000381469727,"schema_count":1,"distance":4.859999942779541,"page_title":"DEMETER ICT -Transform Your Business | Home TH - DEMETER ICT","h1_text":""},{"domain":"fgbradleys.com","acri_score":77,"ai_readiness_score":90,"tech_stack":"wordpress","category":"social","token_bloat_ratio":18.100000381469727,"schema_count":1,"distance":5.190000057220459,"page_title":"F.G. Bradley's Pool Tables, Darts, Poker, Bar Stools \u0026 Game Tables","h1_text":""}]}
