{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"tenable.io","crawled_at":"2026-03-21T11:51:59.295742Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":63597,"rendered_text_length":63597,"ghost_ratio":0,"rendering_type":"SSR","word_count":4697,"li_count":381,"tr_count":0,"th_count":0,"structure_score":8.109999656677246,"has_org_schema":false,"has_product_schema":false,"schema_count":0,"tech_stack":"drupal","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":4509,"total_html_bytes":234416,"useful_text_bytes":63597,"token_bloat_ratio":3.700000047683716,"images_total":34,"images_with_alt":30,"multimodal_pct":88,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":2180,"has_breadcrumb_schema":false,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Tenable Vulnerability Management | Tenable®","meta_description":"Upgrade your vulnerability management strategy with Tenable Vulnerability Management. Try it for free here to find out why Tenable is different from other tools in the market!","logo_url":"https://tenable.io/themes/custom/tenable/images-new/favicons/apple-touch-icon-180x180.png","crawl_blocked":false,"ai_readiness_score":72,"sub_bot_access":100,"sub_rendering":100,"sub_structure":52,"sub_schema":0,"sub_tech_stack":70,"extractability_score":61,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":58,"acri_extractability":89,"acri_semantic_structure":50,"acri_content_integrity":65,"acri_retrieval_robustness":30,"acri_grade":"C","h1_text":"Tenable Vulnerability Management","h2_texts":"Expose and close your cyber weaknesses with the market-leading vulnerability management solution | The world’s #1 vulnerability management solution | Know, expose and close your critical vulnerabilities | Tenable is the only vendor to be named a Customers’ Choice in the 2025 Gartner® Peer Insights™ Voice of the Customer for Vulnerability Assessment","tranco_rank":518086,"category":"government","title_length":44,"meta_desc_length":175,"has_canonical":true,"canonical_url":"https://www.tenable.com/products/vulnerability-management","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":4,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Tenable Vulnerability Management","og_description":"Upgrade your vulnerability management strategy with Tenable Vulnerability Management. Try it for free here to find out why Tenable is different from other tools in the market!","og_image":"https://www.tenable.com/themes/custom/tenable/img/social/tenable-generic.png","twitter_card":"summary_large_image","ttfb_ms":4509,"dom_node_count":2495,"html_payload_kb":228.9,"has_hsts":true,"has_csp":false,"cache_control":"public, max-age=21600","cf_cache_status":"HIT","sitemap_declared":false,"internal_links":347,"external_links":94,"tracker_scripts":0,"tracker_token_pct":0,"global_score":60,"seo_pillar":49,"geo_pillar":76,"perf_pillar":27,"arch_pillar":78,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-24T15:28:40.335006Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"Tenable Vulnerability Management is a risk-based vulnerability management platform providing full network visibility to predict attacks and quickly respond to critical vulnerabilities.","target_audience":"Security engineers, CISOs, IT administrators, cybersecurity professionals, and government agencies.","pricing_model":"Annual subscription, priced by asset (not IP address).","integration_partners":["Nessus","Docker","AWS","Azure"],"compliance_standards":["SOC 2","GDPR"],"competitive_moat":"AI-powered vulnerability prioritization and remediation, combined with a unified exposure management platform.","content_depth_score":8,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features"]}},"percentile":73,"similar_domains":[{"domain":"saskatoon.ca","acri_score":78,"ai_readiness_score":81,"tech_stack":"drupal","category":"government","token_bloat_ratio":1.5,"schema_count":0,"distance":3.6600000143051146,"page_title":"Home | City of Saskatoon","h1_text":"City of Saskatoon Homepage"},{"domain":"mentalhealth.gov","acri_score":79,"ai_readiness_score":81,"tech_stack":"drupal","category":"government","token_bloat_ratio":4.099999904632568,"schema_count":3,"distance":4.769999957084655,"page_title":"Mental Health - Causes, Symptoms, Treatment \u0026 Help | SAMHSA","h1_text":"Mental Health"},{"domain":"gep.com","acri_score":83,"ai_readiness_score":86,"tech_stack":"drupal","category":"government","token_bloat_ratio":2.0999999046325684,"schema_count":3,"distance":5.730000042915345,"page_title":"GEP | AI-Powered Procurement and Supply Chain Software, Strategy \u0026 Managed Services","h1_text":"GLOBAL LEADER IN AI-POWERED PROCUREMENT \u0026 SUPPLY CHAIN TRANSFORMATION"},{"domain":"allinternationalconference.com","acri_score":78,"ai_readiness_score":80,"tech_stack":"proprietary","category":"government","token_bloat_ratio":1.5,"schema_count":0,"distance":11.660000014305115,"page_title":"All International Conferences \u0026 Seminars 2026","h1_text":"All International Conferences \u0026 Seminars 2026"},{"domain":"academy.versa-networks.com","acri_score":79,"ai_readiness_score":86,"tech_stack":"wordpress","category":"government","token_bloat_ratio":3.0999999046325684,"schema_count":1,"distance":11.830000042915344,"page_title":"Online Training \u0026 Certification for SD-WAN, SASE and SSE","h1_text":"Versa Academy"}]}
