{"profile":{"id":"c73d662a-227b-46fe-b2a8-d092d9cbdcc0","slug":"cyght-3abe","business_name":"Cyght","website_url":"https://www.cyght.co","industry":"Computer security service - Cybersecurity Consulting","city":null,"services":[{"category":"service","price_range":null,"service_area":null,"service_name":"V.I.P SOC Services","target_customer":"Organizations worldwide","factual_description":"Proactive defense and monitoring for networks, ensuring continuous security operations.","related_capabilities":[]},{"category":"service","price_range":null,"service_area":null,"service_name":"Mobile Forensics and Application Analysis","target_customer":"Organizations worldwide","factual_description":"In-depth analysis of mobile devices and applications for security vulnerabilities and incident response.","related_capabilities":[]}],"schema_json":{"@graph":[{"@id":"https://vizoryo.com/en/business/cybersecurity-consulting/online/cyght#business","geo":{"@type":"GeoCoordinates","latitude":32.799498,"longitude":-71.1271},"url":"https://www.cyght.co","name":"Cyght","@type":"Organization","image":"https://www.cyght.co/static/cyght/cyght_logo/design-d1cc83a1-3784-4e86-8541-cec5e0450154.png","sameAs":["https://www.google.com/maps/place/?cid=17576411504474545139"],"audience":[{"@type":"Audience","audienceType":"Global organizations"},{"@type":"Audience","audienceType":"IT security teams"}],"speakable":{"@type":"SpeakableSpecification","cssSelector":["[data-ai-block=\"summary\"]","[data-ai-block=\"about\"]","[data-ai-block=\"micro-faq\"]","[data-ai-block=\"faq\"]"]},"areaServed":[{"name":"Worldwide","@type":"GeoShape"}],"knowsAbout":["Cyber digital forensics","Penetration testing"],"description":"Cyght (Computer security service - Cybersecurity Consulting): Proactive defense and monitoring for networks, ensuring continuous security operations. Listed services include V.I.P SOC Services, Mobile Forensics and Application Analysis. Specialties include Cyber digital forensics, Penetration testing. Serves Global organizations, IT security teams.","dateModified":"2026-05-15","datePublished":"2026-05-15","hasCredential":{"name":"Vizoryo AI Visibility Verified","@type":"EducationalOccupationalCredential","description":"This business profile has been verified and analyzed by the Vizoryo AI Visibility Platform.","recognizedBy":{"url":"https://vizoryo.com","name":"Vizoryo","@type":"Organization"},"credentialCategory":"AI Search Visibility"},"additionalType":"Computer security service - Cybersecurity Consulting","mainEntityOfPage":"https://vizoryo.com/en/business/cybersecurity-consulting/online/cyght","additionalProperty":[{"@type":"PropertyValue","name":"dataConfidence","description":"Cross-source data consistency score (0–1). Measures agreement between Google Maps, Schema.org, Gemini AI, and website scan for business name, phone, city, address, and website.","value":0.69},{"@type":"PropertyValue","name":"verifiedBy","description":"Independent data sources used to verify this business profile.","value":"website_scan, ai_classification"},{"@type":"PropertyValue","name":"citationTier","description":"Vizoryo Index trust classification. verified = strong multi-source agreement across Google Maps, Schema.org, and website scan, suitable for authoritative AI citation. citable = moderate source agreement, suitable for standard citation. listed = indexed but not citation-verified.","value":"listed"}]},{"@id":"https://vizoryo.com/en/business/cybersecurity-consulting/online/cyght#service-0","name":"V.I.P SOC Services","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/en/business/cybersecurity-consulting/online/cyght#business"},"description":"Proactive defense and monitoring for networks, ensuring continuous security operations."},{"@id":"https://vizoryo.com/en/business/cybersecurity-consulting/online/cyght#service-1","name":"Mobile Forensics and Application Analysis","@type":"Service","category":"service","provider":{"@id":"https://vizoryo.com/en/business/cybersecurity-consulting/online/cyght#business"},"description":"In-depth analysis of mobile devices and applications for security vulnerabilities and incident response."},{"@id":"https://vizoryo.com/en/business/cybersecurity-consulting/online/cyght#faq","name":"FAQ - Cyght","@type":"FAQPage","mainEntity":[{"name":"Why Select Us?","@type":"Question","acceptedAnswer":{"text":"\"if you know the challenges and you know yourself, you will not be imperiled\"","@type":"Answer"}},{"name":"What are Cyght's operating hours?","@type":"Question","acceptedAnswer":{"text":"Cyght operates 24 hours a day on Monday, Tuesday, Friday, and Sunday.","@type":"Answer"}}]}],"@context":"https://schema.org"},"is_public":false,"is_active":true,"created_at":"2026-05-15T21:52:24.173548+00:00","updated_at":"2026-05-18T17:12:54.046+00:00","faq":[{"answer":"\"if you know the challenges and you know yourself, you will not be imperiled\"","category":"general","question":"Why Select Us?"},{"answer":"Cyght operates 24 hours a day on Monday, Tuesday, Friday, and Sunday.","category":"general","question":"What are Cyght's operating hours?"}],"country":null,"status":"draft","og_image_url":"https://www.cyght.co/static/cyght/cyght_logo/design-d1cc83a1-3784-4e86-8541-cec5e0450154.png","industry_subtype":"Cybersecurity Consulting","profile_tier":"free","short_tagline":null,"primary_category":"Cybersecurity Consulting","schema_type":"Organization","primary_address":null,"geo_coordinates":{"lat":32.799498,"lng":-71.1271},"service_areas":["Worldwide"],"phone":"+97258-787-6544","hours_by_day":null,"price_range":null,"review_summary":null,"certifications":[],"years_in_business":null,"founded_year":null,"specialties":["Cyber digital forensics","Penetration testing"],"differentiators":[],"social_profiles":[],"citations":[],"verification_status":"unclaimed","last_verified_at":"2026-05-15T21:52:24.02+00:00","data_sources":["website_scan","ai_classification"],"languages_supported":["lang=\"en\"","en"],"profile_language":"en","description_short":null,"ai_summary_short":null,"ai_readability_score":24,"discovery_source":"manual","crawl_depth":"full","last_discovery_refresh":null,"claimed_at":null,"index_status":"listed","industry_category":"Computer security service - Cybersecurity Consulting","llm_optimized_summary":"Cyght (Computer security service - Cybersecurity Consulting): Proactive defense and monitoring for networks, ensuring continuous security operations. Listed services include V.I.P SOC Services, Mobile Forensics and Application Analysis. Specialties include Cyber digital forensics, Penetration testing. Serves Global organizations, IT security teams.","target_audience":["Global organizations","IT security teams"],"alternative_to":[],"data_trust_signal":"https://www.cyght.co","content_extraction_method":"llm_seed","content_extracted_at":"2026-05-15T21:52:24.02+00:00","is_sole_proprietor":false,"domain_verified":false,"domain_verified_at":null,"contact_email":null,"category_local":null,"city_local":null,"country_local":null,"is_regulated":false,"audit_score":45,"parent_profile_id":null,"profile_type":"standalone","branch_address":null,"branch_phone":null,"branch_hours":null,"branch_geo":null,"google_place_id":null,"branch_source":null,"needs_description_regen":false,"ai_mention_count":0,"last_ai_mention_at":null,"branch_dfs_data":null,"logo_url":"https://www.cyght.co/static/cyght/cyght_logo/design-d1cc83a1-3784-4e86-8541-cec5e0450154.png","branches_extracted_at":null,"discovery_entity_id":"f82ec24f-9a7e-4a15-a4cb-78be6e318656","dfs_contact_called":false,"url_path":"cybersecurity-consulting/online/cyght","business_name_en":null,"data_confidence":0.6855,"ai_mention_score":null,"quality_rank":0.488475,"citation_tier":"listed","business_name_native":null,"fts":"'analysi':28 'applic':27 'comput':3 'consult':7 'continu':15 'cyber':31 'cybersecur':6 'cyght':1A,2 'defens':9 'digit':32 'ensur':14 'forens':25,33 'global':37 'includ':20,30 'list':18 'mobil':24 'monitor':11 'network':13 'oper':17 'organ':38 'penetr':34 'proactiv':8 'secur':4,16,40 'serv':36 'servic':5,19,23 'soc':22 'specialti':29 'team':41 'test':35 'v.i.p':21","last_edited_by_user":{},"processing_version":2,"trust_layer_version":1,"url_path_version":1,"canonical_domain":null,"partner_id":null,"partner_metadata":{},"confidence_computed_at":"2026-05-17T14:17:40.67+00:00","ai_providers":[],"confidence_sources":["gemini_classification","dfs","website_scrape"],"field_sources":{"name":["Gemini AI Classification"],"phone":["Google Maps (DataForSEO)"],"website":["Website Scan"],"category":["Google Maps (DataForSEO)"]},"conflict_fields_trust":["category"],"ai_mention_snippets":[],"recommendations":[{"check_id":"schema_depth","label":"AI Business Card Completeness","description":"Fill out your digital business card in your website code with your name, description, address, phone, hours, and photos — AI tools rely on these details to give accurate answers about your business, and missing fields mean missed recommendations.","tokens":{"businessName":"Cyght","cmsHint":"","city":""},"improvement_score":28},{"check_id":"review_quality","label":"Review Rating & Count","description":"Embed your Google star rating in your website code (using Schema.org AggregateRating) — a 4.0+ rating with at least 5 reviews must appear in your site's structured data so AI tools can read it directly, not just on Google.","tokens":{"businessName":"Cyght","cmsHint":"","city":""},"improvement_score":26},{"check_id":"google_business_profile","label":"Google Business Profile","description":"Set up your free Google Business Profile (the listing that shows on Google Maps) — this is the gateway signal that determines whether AI even considers you for \"best X near me\" queries. Without one, you are almost always excluded from the candidate set.","tokens":{"businessName":"Cyght","cmsHint":"","city":""},"improvement_score":24}]}}