{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"trustedsec.com","crawled_at":"2026-03-21T12:09:15.923875Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":22629,"rendered_text_length":26622,"ghost_ratio":0.15000000596046448,"rendering_type":"Hybrid","word_count":1459,"li_count":40,"tr_count":0,"th_count":0,"structure_score":2.740000009536743,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"proprietary","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":943,"total_html_bytes":266026,"useful_text_bytes":22629,"token_bloat_ratio":11.800000190734863,"images_total":39,"images_with_alt":10,"multimodal_pct":26,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":2614,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"TrustedSec | Your Trusted Cybersecurity Partner | TrustedSec","meta_description":"Experience fundamentally different cybersecurity for business success, providing end-to-end consulting from penetration testing to design and hardening.","logo_url":"https://trustedsec.com/favicons/apple-touch-icon.png","crawl_blocked":false,"ai_readiness_score":71,"sub_bot_access":100,"sub_rendering":94,"sub_structure":30,"sub_schema":42,"sub_tech_stack":50,"extractability_score":51,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":53,"acri_extractability":67,"acri_semantic_structure":46,"acri_content_integrity":67,"acri_retrieval_robustness":34,"acri_grade":"D","h1_text":"Your security partner for good","h2_texts":"Solutions | Services | About Us | Making Waves in Cybersecurity Consulting Services | Trusted by top security teams around the world | Fundamentally different cybersecurity | Explore trend-setting cybersecurity resources | Trimarc Joins Forces with TrustedSec | We understand security challenges | Born to prove security can be better","tranco_rank":280614,"category":"infrastructure","title_length":60,"meta_desc_length":152,"has_canonical":true,"canonical_url":"https://trustedsec.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":18,"h2_before_h1":true,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Your Trusted Cybersecurity Partner | TrustedSec","og_description":"Experience fundamentally different cybersecurity for business success, providing end-to-end consulting from penetration testing to design and hardening.","og_image":"https://trusted-sec.transforms.svdcdn.com/production/images/TrustedSec-Stock-3/alex-home.jpg?w=1200\u0026h=630\u0026q=82\u0026auto=format\u0026fit=crop\u0026crop=focalpoint\u0026fp-x=0.4272\u0026fp-y=0.3402\u0026dm=1767055059\u0026s=eebe63b1a25ad8bf1653776768a65e9b","twitter_card":"summary_large_image","ttfb_ms":943,"dom_node_count":1154,"html_payload_kb":259.8,"has_hsts":true,"has_csp":false,"cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://trustedsec.com/sitemaps-1-sitemap.xml","internal_links":65,"external_links":6,"tracker_scripts":1,"tracker_domains":"googletagmanager.com","tracker_token_pct":0,"global_score":70,"seo_pillar":72,"geo_pillar":70,"perf_pillar":59,"arch_pillar":81,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":361360,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":8,"llm_analyzed":true,"llm_analyzed_at":"2026-03-13T13:27:14.808649Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"TrustedSec provides security blogs and articles focused on threat hunting, incident response, and vulnerability assessments to help security professionals improve their skills and knowledge.","target_audience":"Security analysts, incident responders, penetration testers, CISOs, security consultants, and IT professionals seeking to enhance their security expertise.","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":["SOC 2","CMMC"],"competitive_moat":"Deep threat hunting expertise and a community-driven approach to security knowledge sharing, combined with a focus on practical, hands-on techniques.","content_depth_score":8,"programmatic_seo_signals":["Blog","Topics","Filter"],"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features"]}},"percentile":70,"similar_domains":[{"domain":"jsaccessories.co.uk","acri_score":78,"ai_readiness_score":80,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.700000047683716,"schema_count":1,"distance":6.480000042915345,"page_title":"J\u0026S Accessories - Motorcycle Helmets, Clothing and Accessories | J\u0026S Accessories","h1_text":""},{"domain":"adire.jp","acri_score":78,"ai_readiness_score":78,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.299999952316284,"schema_count":1,"distance":6.6000000715255736,"page_title":"【公式】過払い金や債務整理・借金返済ならアディーレ法律事務所！弁護士へ無料相談","h1_text":"債務整理・借金返済の無料相談ならアディーレ法律事務所"},{"domain":"jbrj.gov.br","acri_score":78,"ai_readiness_score":84,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":2.299999952316284,"schema_count":2,"distance":7.1000000715255736,"page_title":"Pagina Inicial — Instituto de Pesquisas Jardim Botânico do Rio de Janeiro","h1_text":"Instituto de Pesquisas Jardim Botânico do Rio de Janeiro"},{"domain":"dreambooks.pt","acri_score":78,"ai_readiness_score":86,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":3.700000047683716,"schema_count":3,"distance":7.180000042915344,"page_title":"Nº 1 em Fotografia em Portugal — Dreambooks","h1_text":""},{"domain":"palpis.net","acri_score":78,"ai_readiness_score":80,"tech_stack":"proprietary","category":"infrastructure","token_bloat_ratio":1.7000000476837158,"schema_count":0,"distance":7.2800000429153435,"page_title":"PALPIS（パルピス）","h1_text":""}]}
