{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"securitymagazine.com","crawled_at":"2026-03-18T06:47:00.386515Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":9303,"rendered_text_length":10337,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":1023,"li_count":140,"tr_count":0,"th_count":0,"structure_score":13.6899995803833,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"express","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":1123,"total_html_bytes":147735,"useful_text_bytes":9303,"token_bloat_ratio":15.899999618530273,"images_total":26,"images_with_alt":26,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":5794,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Security Magazine | The business magazine for security executives","meta_description":"Security provides security industry news and trends on video surveillance, cyber security, physical security, security guards, risk management, access control and more for security executives and the security industry.","logo_url":"https://securitymagazine.com/images/favicon/favicons.ico","crawl_blocked":false,"ai_readiness_score":73,"sub_bot_access":100,"sub_rendering":97,"sub_structure":68,"sub_schema":0,"sub_tech_stack":55,"extractability_score":51,"crawl_cost_score":40,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":59,"acri_extractability":75,"acri_semantic_structure":60,"acri_content_integrity":55,"acri_retrieval_robustness":40,"acri_grade":"C","h1_text":"Document Protection: Why Hybrid Storage Is the Future of Security","h2_texts":"Which of these global issues has affected your organization the most? | The Future of Executive Protection: Layering Technology, Intelligence, and Response | How AI is Closing the Decision Gap in Leading GSOCs | Building a Campus-Wide Culture of Security and Shared Responsibility | Sign-up to receive top management \u0026 result-driven techniques in the industry. | Join over 20,000+ industry leaders who receive our premium content.","tranco_rank":30124,"category":"education","title_length":65,"meta_desc_length":218,"has_canonical":true,"canonical_url":"https://www.securitymagazine.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":37,"h2_count":6,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","ttfb_ms":1123,"dom_node_count":903,"html_payload_kb":144.3,"has_hsts":true,"has_csp":true,"cache_control":"must-revalidate, public, max-age=0","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://www.securitymagazine.com/sitemap.xml","internal_links":191,"external_links":36,"tracker_scripts":1,"tracker_domains":"doubleclick.net","tracker_token_pct":0,"global_score":64,"seo_pillar":35,"geo_pillar":73,"perf_pillar":53,"arch_pillar":100,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-01T21:37:03.730397Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"This website provides curated security news, trends, and analysis for security executives, focusing on emerging threats and strategic considerations in an interconnected risk landscape.","target_audience":"Security executives, CISOs, security analysts, and IT professionals involved in cybersecurity strategy and risk management.","pricing_model":"Subscription-based; details not explicitly stated, but likely tiered based on content access and features.","integration_partners":[],"compliance_standards":[],"competitive_moat":"Expert curation of security news and analysis, providing a valuable resource for security executives navigating complex threats.","content_depth_score":6,"programmatic_seo_signals":["Blog post titles","Event listings","Sponsored content links"],"key_pain_points":["Lack of structured information for security executives","Reliance on fragmented news sources"]}},"percentile":75,"similar_domains":[{"domain":"ouhs.jp","acri_score":80,"ai_readiness_score":84,"tech_stack":"wordpress","category":"education","token_bloat_ratio":3.799999952316284,"schema_count":1,"distance":15.279999899864197,"page_title":"トップページ - 大阪体育大学","h1_text":""},{"domain":"nashvillerotary.org","acri_score":80,"ai_readiness_score":84,"tech_stack":"wordpress","category":"education","token_bloat_ratio":3,"schema_count":1,"distance":15.519999885559082,"page_title":"Rotary Club of Nashville - Serving our community since 1914","h1_text":""},{"domain":"nluo.ac.in","acri_score":80,"ai_readiness_score":87,"tech_stack":"wordpress","category":"education","token_bloat_ratio":1.7999999523162842,"schema_count":1,"distance":15.879999899864197,"page_title":"Home - NLUO | National Law University Odisha","h1_text":""},{"domain":"house.hackers.com","acri_score":80,"ai_readiness_score":80,"tech_stack":"proprietary","category":"education","token_bloat_ratio":1.7000000476837158,"schema_count":1,"distance":15.909999871253968,"page_title":"�ð� 1� �Ŀ� :: � � �հ�, �Ŀ�","h1_text":""},{"domain":"epolice.hackers.com","acri_score":81,"ai_readiness_score":86,"tech_stack":"proprietary","category":"education","token_bloat_ratio":1.7000000476837158,"schema_count":1,"distance":16.059999871253968,"page_title":"�Ŀ�:: �縸� 100%, 2024 �ѱ�ǰ� � 1� �Ŀ�","h1_text":""}]}
