{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.4,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"venafi.com","crawled_at":"2026-03-20T09:23:30.045205Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":8800,"rendered_text_length":8800,"ghost_ratio":0,"rendering_type":"SSR","word_count":875,"li_count":198,"tr_count":0,"th_count":0,"structure_score":22.6299991607666,"has_org_schema":true,"has_product_schema":false,"schema_count":1,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":613,"total_html_bytes":261342,"useful_text_bytes":8800,"token_bloat_ratio":29.700000762939453,"images_total":19,"images_with_alt":19,"multimodal_pct":100,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":28886,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Venafi is now CyberArk Machine Identity Security | CyberArk","meta_description":"By combining Venafi’s leading machine identity security with CyberArk’s Identity Security Platform, you can apply the right level of privileged access controls for every identity in your organization.","logo_url":"https://venafi.com/favicon-48x48.png","crawl_blocked":false,"ai_readiness_score":87,"sub_bot_access":100,"sub_rendering":100,"sub_structure":87,"sub_schema":42,"sub_tech_stack":85,"extractability_score":65,"crawl_cost_score":60,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":70,"acri_extractability":75,"acri_semantic_structure":79,"acri_content_integrity":54,"acri_retrieval_robustness":67,"acri_grade":"B","h1_text":"Searching for Venafi? We’re now CyberArk Machine Identity Security.","h2_texts":"Your identity security world just got bigger. By combining Venafi’s leading machine identity security with CyberArk’s Identity Security Platform, you can apply the right level of privileged access controls for every identity in your organization. And you’ll still get world-class machine identity security for certificate lifecycle management, enterprise PKI, workload identity management, secure code signing, and SSH security. | Learn how you can strengthen your machine identity security strategy.","tranco_rank":76332,"category":"finance","title_length":59,"meta_desc_length":204,"has_canonical":true,"canonical_url":"https://www.cyberark.com/venafi-and-cyberark-machine-identity-security/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":4,"h2_count":2,"h2_before_h1":false,"has_hreflang":false,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Venafi is now CyberArk Machine Identity Security","og_description":"By combining Venafi’s leading machine identity security with CyberArk’s Identity Security Platform, you can apply the right level of privileged access controls for every identity in your organization.","og_image":"https://www.cyberark.com/wp-content/uploads/2024/10/Certs-pki.jpg","twitter_card":"summary_large_image","ttfb_ms":613,"dom_node_count":1062,"html_payload_kb":255.2,"has_hsts":true,"has_csp":true,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://venafi.com/sitemap.xml","internal_links":1,"external_links":152,"tracker_scripts":0,"tracker_token_pct":0,"global_score":69,"seo_pillar":64,"geo_pillar":71,"perf_pillar":59,"arch_pillar":86,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":0,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":0,"llm_analyzed":true,"llm_analyzed_at":"2026-03-04T07:59:15.998074Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"CyberArk provides security bulletins and resources to address vulnerabilities in its products.","target_audience":"Security professionals, IT administrators, system engineers","pricing_model":"SEMANTIC VOID","integration_partners":[],"compliance_standards":[],"competitive_moat":"Proactive vulnerability management and rapid response to security threats.","content_depth_score":5}},"percentile":99,"similar_domains":[{"domain":"digitalnewstoday.in","acri_score":78,"ai_readiness_score":82,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":4.599999904632568,"schema_count":1,"distance":6.2,"page_title":"Digital News Today – Breaking News, World Updates \u0026 Live Stories","h1_text":"digitalnewstoday"},{"domain":"trustonefinancial.org","acri_score":78,"ai_readiness_score":89,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":7,"schema_count":1,"distance":6.2,"page_title":"Home - TruStone Financial CU","h1_text":"Your Backyard: Upgraded."},{"domain":"vogate.com","acri_score":79,"ai_readiness_score":84,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":3.299999952316284,"schema_count":1,"distance":6.35,"page_title":"Find a World of Knowledge and Learning with Vogate","h1_text":"Best Selling Products"},{"domain":"bbkonline.com","acri_score":81,"ai_readiness_score":88,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":2.200000047683716,"schema_count":1,"distance":6.65,"page_title":"BBK | Bank of Bahrain and Kuwait","h1_text":"Digitally driven, expertly curated"},{"domain":"yolo.io","acri_score":82,"ai_readiness_score":88,"tech_stack":"wordpress","category":"finance","token_bloat_ratio":2.799999952316284,"schema_count":1,"distance":6.8,"page_title":"Yolo Investments","h1_text":"make a difference"}]}
