{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"truedigitalsecurity.com","crawled_at":"2026-03-21T12:58:24.532714Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":16210,"rendered_text_length":18011,"ghost_ratio":0.10000000149011612,"rendering_type":"Hybrid","word_count":1454,"li_count":133,"tr_count":0,"th_count":0,"structure_score":9.149999618530273,"has_org_schema":false,"has_product_schema":false,"schema_count":1,"tech_stack":"hubspot","server_header":"nginx","cdn":"","http_status":200,"load_time_ms":836,"total_html_bytes":111624,"useful_text_bytes":16210,"token_bloat_ratio":6.900000095367432,"images_total":15,"images_with_alt":8,"multimodal_pct":53,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":5659,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":false,"page_title":"Cybersecurity Company - Cyber Compliance \u0026 IT Governance Services to Protect Your Digital Security | True Digital Security","meta_description":"True Digital Security provides cyber compliance \u0026 IT governance services to protect your digital security. Discover how we meet all your objectives.","crawl_blocked":false,"ai_readiness_score":73,"sub_bot_access":100,"sub_rendering":97,"sub_structure":55,"sub_schema":2,"sub_tech_stack":70,"extractability_score":56,"crawl_cost_score":30,"crawl_cost_label":"Low","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":60,"acri_extractability":76,"acri_semantic_structure":56,"acri_content_integrity":65,"acri_retrieval_robustness":39,"acri_grade":"C","h1_text":"Still Separating  IT, Cybersecurity, and compliance services?","h2_texts":"True Digital Security is now a wholly owned member of the CISO Global family of companies. | Cybersecurity Compliance, Audits, and Assessment Services | You need total visibility and coordination across departments to thrive. | CISO Global can help. | Penetration Testing and Yearly Compliance Reviews | End-of-Year Cybersecurity Compliance | MAKE CYBERSECURITY A TEAM SPORT | IT Cybersecurity Managed Detection \u0026 Response Services 24x7x365 | Get Started with CISO Global | GROW YOUR BUSINESS SECURELY","tranco_rank":732693,"category":"government","title_length":122,"meta_desc_length":148,"has_canonical":true,"canonical_url":"https://truedigitalsecurity.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":20,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en","og_title":"Cybersecurity Company - Cyber Compliance \u0026 IT Governance Services to Protect Your Digital Security","og_description":"Leverage our trained experts and custom solutions to help you meet end-to-end IT and Security goals. ","og_image":"https://truedigitalsecurity.com/assets/images/template/TrueLogo-01.jpg","twitter_card":"summary","ttfb_ms":836,"dom_node_count":903,"html_payload_kb":109,"has_hsts":false,"has_csp":false,"cache_control":"no-store, no-cache, must-revalidate","sitemap_declared":true,"sitemap_url":"https://truedigitalsecurity.com/sitemap.xml","internal_links":151,"external_links":12,"tracker_scripts":2,"tracker_domains":"googletagmanager.com | js.hs-scripts.com","tracker_token_pct":0,"global_score":68,"seo_pillar":47,"geo_pillar":81,"perf_pillar":65,"arch_pillar":75,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-04-03T03:34:54.45009Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"CISO Global provides cybersecurity solutions, including compliance, project, and managed services, to build a culture of cybersecurity.","target_audience":"Cybersecurity professionals, risk managers, compliance officers, IT leaders","pricing_model":"Not specified - services based on custom proposals and engagement.","integration_partners":[],"compliance_standards":[],"competitive_moat":"Holistic cybersecurity approach combining compliance, project, and managed services with expert personnel.","content_depth_score":6,"key_pain_points":["Lack of specific pricing information","Limited detail on service offerings beyond general solutions"]}},"percentile":75,"similar_domains":[{"domain":"muskegon-mi.gov","acri_score":78,"ai_readiness_score":88,"tech_stack":"wordpress","category":"government","token_bloat_ratio":5.199999809265137,"schema_count":1,"distance":11.210000085830687,"page_title":"The City of Muskegon","h1_text":"City of Muskegon"},{"domain":"adaptiveplanning.com","acri_score":78,"ai_readiness_score":91,"tech_stack":"aem","category":"government","token_bloat_ratio":5,"schema_count":1,"distance":11.270000028610228,"page_title":"Enterprise Performance Management Software | Workday US","h1_text":"EPM SOFTWARE FROM WORKDAY"},{"domain":"adaptiveinsights.com","acri_score":78,"ai_readiness_score":91,"tech_stack":"aem","category":"government","token_bloat_ratio":5,"schema_count":1,"distance":11.270000028610228,"page_title":"Enterprise Performance Management Software | Workday US","h1_text":"EPM SOFTWARE FROM WORKDAY"},{"domain":"wwwilliams.com","acri_score":78,"ai_readiness_score":90,"tech_stack":"wordpress","category":"government","token_bloat_ratio":10.899999618530273,"schema_count":1,"distance":11.899999856948853,"page_title":"W.W. Williams | Equipment, Diesel \u0026 Truck Repair, Service \u0026 More","h1_text":"Expanding Our California Footprint"},{"domain":"elkay.com","acri_score":79,"ai_readiness_score":87,"tech_stack":"aem","category":"government","token_bloat_ratio":4.800000190734863,"schema_count":2,"distance":11.97999997138977,"page_title":"Elkay | Sinks, Faucets, ezH2O Bottle Filling Stations","h1_text":"PRO FILTRATION"}]}
