{"avg":{"avg_bot_access":91.6,"avg_rendering":93,"avg_structure":35.3,"avg_schema":9.4,"avg_tech_stack":63.4,"avg_overall":56.8},"domain":{"domain":"xmcyber.com","crawled_at":"2026-03-20T17:21:21.480963Z","gptbot_allowed":true,"claudebot_allowed":true,"ccbot_allowed":true,"google_extended_allowed":true,"googlebot_allowed":true,"raw_text_length":153154,"rendered_text_length":153154,"ghost_ratio":0,"rendering_type":"SSR","word_count":2655,"li_count":176,"tr_count":0,"th_count":0,"structure_score":6.630000114440918,"has_org_schema":true,"has_product_schema":false,"schema_count":2,"tech_stack":"wordpress","server_header":"cloudflare","cdn":"cloudflare","http_status":200,"load_time_ms":684,"total_html_bytes":403779,"useful_text_bytes":153154,"token_bloat_ratio":2.5999999046325684,"images_total":55,"images_with_alt":0,"multimodal_pct":0,"tdm_reservation":false,"has_noai_tag":false,"script_bytes":31030,"has_breadcrumb_schema":true,"has_faq_schema":false,"has_article_schema":false,"has_website_schema":true,"page_title":"Continuous Exposure Management | XM Cyber","meta_description":"Illuminate and disrupt the attack paths leading to your critical assets, in the cloud or on-premises.","logo_url":"https://xmcyber.com/wp-content/uploads/2026/02/cropped-cropped-Frame-222-32x32.png","crawl_blocked":false,"ai_readiness_score":80,"sub_bot_access":100,"sub_rendering":100,"sub_structure":47,"sub_schema":44,"sub_tech_stack":85,"extractability_score":70,"crawl_cost_score":50,"crawl_cost_label":"Medium","blocklist_risk":0,"blocklist_risk_label":"None","acri_score":66,"acri_extractability":83,"acri_semantic_structure":57,"acri_content_integrity":79,"acri_retrieval_robustness":46,"acri_grade":"C","h1_text":"Prioritize and Fix High-Risk Exposures Faster","h2_texts":"15,000 Exposures | See All Exposures, Fix What’s Critical | Fix What Matters with Business Context | Challenging the Status Quo | Secure Your Business Initiatives | The Most Comprehensive Solution for Adopting CTEM | What Our Customers Say | 394% | $12.4M | $1.4M","tranco_rank":158436,"category":"infrastructure","title_length":41,"meta_desc_length":101,"has_canonical":true,"canonical_url":"https://xmcyber.com/","canonical_mismatch":false,"has_meta_viewport":true,"h1_count":1,"h2_count":12,"h2_before_h1":false,"has_hreflang":true,"has_noindex":false,"has_lang_attr":true,"lang_attr":"en-US","og_title":"Continuous Exposure Management | XM Cyber","og_description":"Fix What Matters with an innovative, threat-led approach to Vulnerability Management.","og_image":"https://xmcyber.com/wp-content/uploads/2024/11/XM-cover-HP.png","twitter_card":"summary_large_image","ttfb_ms":684,"dom_node_count":1570,"html_payload_kb":394.3,"has_hsts":true,"has_csp":false,"cache_control":"max-age=600, must-revalidate","cf_cache_status":"DYNAMIC","sitemap_declared":true,"sitemap_url":"https://xmcyber.com/sitemap_index.xml","internal_links":192,"external_links":10,"tracker_scripts":0,"tracker_token_pct":0,"global_score":74,"seo_pillar":75,"geo_pillar":84,"perf_pillar":52,"arch_pillar":76,"data_tier":1,"ai_trust_score":0,"ai_trust_rank":162931,"ai_trust_percentile":0,"inbound_ai_links":0,"outbound_ai_links":8,"llm_analyzed":true,"llm_analyzed_at":"2026-03-08T10:52:26.959258Z","llm_model":"mlx-community/gemma-3-4b-it-qat-4bit","ai_unified_analysis":{"core_offering":"XM Cyber empowers organizations to proactively manage and reduce cyber exposure by providing an AI-powered platform that maps attack paths","target_audience":"Security analysts, CISOs, IT managers, DevOps engineers, and security operations teams within high-value organizations, particularly those with complex IT environments and a need for robust risk management.","pricing_model":"Subscription-based, with tiered pricing based on features and usage. Pricing not explicitly stated, but likely ranging from $10/user/month to enterprise-level contracts.","integration_partners":["Slack","GitHub","Jira"],"compliance_standards":[],"competitive_moat":"The company’s foundation in Israeli Intelligence provides a unique competitive advantage through its deep understanding of attacker methodologies and a focus on proactive exposure management, combined with AI-powered analysis and real-time risk prioritization.","content_depth_score":8,"programmatic_seo_signals":["Integration directory pages","Template comparison pages"],"key_pain_points":["Lack of structured FAQ schema","Thin landing pages for features"]}},"percentile":94,"similar_domains":[{"domain":"driphydration.com","acri_score":86,"ai_readiness_score":95,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.899999976158142,"schema_count":2,"distance":3.209999978542328,"page_title":"Drip Hydration - IV Therapy \u0026 Mobile Wellness","h1_text":"The Global Leader in Mobile IV Therapy"},{"domain":"profitserver.net","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.799999952316284,"schema_count":2,"distance":3.3600000143051147,"page_title":"Rent VPS from $1.9/mo. Unlimited, full root. 24/7 support. Virtual Private Server. VPS Hosting Plans.","h1_text":"Rent virtual VPS server"},{"domain":"safely.co.jp","acri_score":90,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":1.899999976158142,"schema_count":3,"distance":4.3099999785423275,"page_title":"【公式】セーフリー｜口コミ比較で失敗しない、安心の業者選びを提供します。","h1_text":""},{"domain":"hi-ad.jp","acri_score":86,"ai_readiness_score":90,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":3.0999999046325684,"schema_count":5,"distance":4.65,"page_title":"販促花子|ノベルティ・販促品・名入れ・記念品のオリジナルグッズ印刷・制作","h1_text":"ノベルティ・販促品・記念品の名入れなら販促花子|激安コミコミ価格・高品質・小ロット・最短翌日発送"},{"domain":"meriambet.us.com","acri_score":87,"ai_readiness_score":95,"tech_stack":"wordpress","category":"infrastructure","token_bloat_ratio":4.099999904632568,"schema_count":6,"distance":5.6,"page_title":"MERIAMBET 🌟 Akses VIP Situs Toto88 SLot Online Depo 5k Terpercaya Mudah JP","h1_text":"MERIAMBET 🌟 Akses VIP Situs Toto88 SLot Online Depo 5k Terpercaya Mudah JP"}]}
