{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"redsift.com","crawled_at":"2026-03-13T07:49:23.341067Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":20079,"rendered_text_length":21136,"ghost_ratio":0.05000000074505806,"rendering_type":"SSR","word_count":2993,"li_count":32,"tr_count":0,"th_count":0,"structure_score":1.0700000524520874,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"nextjs","server_header":"","cdn":"","http_status":200,"load_time_ms":509,"total_html_bytes":503331,"useful_text_bytes":20079,"token_bloat_ratio":25.100000381469727,"images_total":93,"images_with_alt":90,"multimodal_pct":97,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":169023,"has_breadcrumb_schema":false,"has_faq_schema":true,"has_article_schema":false,"has_website_schema":true,"page_title":"Red Sift | Creating a Fundamentally Safer Internet with Proactive Security","meta_description":"Trusted by 1,200+ teams worldwide, Red Sift makes it simple to deploy proactive security across email, web and PKI -- embracing protocols like DMARC \u0026 TLS, protecting gaps, and scaling with AI.","logo_url":"https://redsift.com/favicon-v2.svg","crawl_blocked":false,"ai_readiness_score":72,"sub_bot_access":100,"sub_rendering":99,"sub_structure":19,"sub_schema":42,"sub_tech_stack":70,"extractability_score":45,"crawl_cost_score":75,"crawl_cost_label":"High","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":49,"acri_extractability":74,"acri_semantic_structure":38,"acri_content_integrity":62,"acri_retrieval_robustness":26,"acri_grade":"D","h1_text":"Let’s fix your email, domain and web security","h2_texts":"Why 1,200+ security teams choose Red Sift | Secure your inbox and your brand with Red Sift | See proactive brand and email security in action | Frequently asked questions","tranco_rank":384198,"category":"infrastructure","title_length":74,"meta_desc_length":193,"has_canonical":true,"canonical_url":"https://redsift.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":4,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-us","og_title":"Red Sift | Creating a Fundamentally Safer Internet with Proactive Security","og_description":"Trusted by 1,200+ teams worldwide, Red Sift makes it simple to deploy proactive security across email, web and PKI -- embracing protocols like DMARC \u0026 TLS, protecting gaps, and scaling with AI.","og_image":"https://images.prismic.io/red-sift/aTAJGnNYClf9nwai_Meta_image_only.png?auto=format,compress","ttfb_ms":509,"dom_node_count":1641,"html_payload_kb":491.5,"has_hsts":true,"has_csp":true,"cache_control":"s-maxage=31536000, stale-while-revalidate=2592000","sitemap_declared":true,"sitemap_url":"https://redsift.com/sitemap.xml","internal_links":63,"external_links":13,"tracker_scripts":0,"tracker_token_pct":0,"global_score":66,"seo_pillar":67,"geo_pillar":61,"perf_pillar":52,"arch_pillar":99,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-18T04:05:10.813679Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Red Sift provides proactive, intelligent security across email, web, and PKI to protect organizations and their customers from harmful attacks,","target_audience":"Security leaders, CISOs, IT professionals, and organizations seeking comprehensive cybersecurity protection across various channels.","pricing_model":"Subscription-based, with tiered pricing based on features and usage, likely including a free tier for basic protection.","integration_partners":["ReturnPath","Autonomy"],"compliance_standards":["DMARC","TLS"],"competitive_moat":"AI-powered threat detection and response, combined with deep expertise in web security and PKI, offering a more proactive and automated approach than traditional security solutions.","content_depth_score":8,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["Protecting against known gaps in protocols","Scaling security efforts with manual workload reduction"]}},"percentile":73,"similar_domains":[{"domain":"peachesandcream.co.nz","acri_score":74,"ai_readiness_score":86,"tech_stack":"nextjs","category":"infrastructure","token_bloat_ratio":13.399999618530273,"schema_count":3,"distance":8.260000228881836,"page_title":"Peaches and Cream - New Zealand's place for pleasure.","h1_text":"Peaches and Cream - New Zealand's place for pleasure."},{"domain":"norwegian-wool.com","acri_score":74,"ai_readiness_score":86,"tech_stack":"nextjs","category":"infrastructure","token_bloat_ratio":15.699999809265137,"schema_count":5,"distance":8.570000171661377,"page_title":"Luxury Performance Apparel \u0026 Outerwear – Norwegian Wool","h1_text":""},{"domain":"hexagona.com","acri_score":74,"ai_readiness_score":84,"tech_stack":"nextjs","category":"infrastructure","token_bloat_ratio":4,"schema_count":2,"distance":9.25,"page_title":"Hexagona | Maroquinerie de Qualité pour Hommes et Femmes Depuis 1996\n      \n      \n       – Hexagona Paris","h1_text":"Collection Printemps-Été 26"},{"domain":"cholewinski.com","acri_score":74,"ai_readiness_score":84,"tech_stack":"nextjs","category":"infrastructure","token_bloat_ratio":3.799999952316284,"schema_count":2,"distance":9.25,"page_title":"Cholewinski","h1_text":""},{"domain":"knownsource.co.uk","acri_score":74,"ai_readiness_score":83,"tech_stack":"nextjs","category":"infrastructure","token_bloat_ratio":5.199999809265137,"schema_count":6,"distance":11.25,"page_title":"Known Source","h1_text":"Ready for spring?"}]}
