Com-sys.de - SEO Checker

Overview of the SEO Check
Meta information
100% 
Page quality
74% 
Page structure
79% 
Link structure
71% 
Server
54% 
External factors
100% 
SEO Score
Response time
0.28 s
File size
193.40 kB
Words
829
Media files
42
Number of links
99 internal / 9 external

Task list of SEO Improvements

Meta specifications

Title
(Critically important)
Your compass to cybersecurity | Com-Sys
The length of the page title is perfect. (373 pixels out of 580 max pixel length)
There are no duplicate words in the title
Meta description
(Critically important)
Als Navigatoren der IT-Sicherheitslandschaft bieten wir Ihnen Orientierung in der komplexen Cybersecurity-Welt...
The length of the meta description is perfect. (700 pixels out of 1000 max pixel length)
Crawlability
(Critically important)
There are no problems in accessing the website.
Canonical URL
(Important)
https://com-sys.de/
There is a valid canonical link specified.
Language
(Somewhat important)
Language detected in text: de
Language defined in HTML: de
Server location: United States of America
The following language is defined by HTML: de
Alternate/Hreflang Links
(Somewhat important)
There are no alternate links specified on this page.
Other meta tags
(Somewhat important)
There is no rel next meta tag on this page.
There is no rel prev meta tag on this page.
Domain
(Somewhat important)
The domain is no subdomain.
The domain length is good.
The domain does not contain non-latin characters.
Page URL
(Somewhat important)
No parameters were found in the URL.
No session ID was found in the URL.
The URL does not have too many subdirectories.
Charset encoding
(Somewhat important)
The charset encoding (UTF-8) is set correctly.
Doctype
(Nice to have)
The doctype HTML 5 is set correctly.
The doctype is placed at first in the HTML code.
Favicon
(Nice to have)
The favicon is linked correctly.

Meta tags

NameValue
viewportwidth=device-width, initial-scale=1.0
robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
descriptionAls Navigatoren der IT-Sicherheitslandschaft bieten wir Ihnen Orientierung in der komplexen Cybersecurity-Welt...
msvalidate.01D83FE59D4D9C05D322B3E227948BCCE0
google-site-verification0wCDFFoCtdcp3tQ1JwCvmKIbR7yTjNvyquuKlhsuulk
generatorWordPress 6.8.1
msapplication-TileColor#ffffff
msapplication-confighttps://com-sys.de/wp-content/themes/comsys-website/dist/assets/favicon/browserconfig.xml
theme-color#ffffff
msapplication-TileImagehttps://com-sys.de/wp-content/uploads/2024/05/FavIcon_neu.jpg
article:modified_time2025-01-30T10:12:44+00:00
langde
twitter:cardsummary_large_image
og:localede_DE
og:typewebsite
og:titleYour compass to cybersecurity | Com-Sys
og:descriptionAls Navigatoren der IT-Sicherheitslandschaft bieten wir Ihnen Orientierung in der komplexen Cybersecurity-Welt...
og:urlhttps://com-sys.de/
og:site_nameCom-Sys
X-UA-CompatibleIE=edge
charsetUTF-8

Automatically check com-sys.de including all subpages at once!

Try for free
Guaranteed free of charge during trial period.

Page quality

Content
(Critically important)
Words from the H1 heading are not used in the page content.
This page contains 829 words. That's ok.
31.4% of the text are stop words.
Keywords used in the page title are also used in the page content. That's good!
The page contains a listing, which indicates a good text layout.
8 paragraphs were found on this page.
No placeholders texts or images were found.
There are no duplicates on the site.
The average number of words per sentence of 17.08 words is good.
Frames
(Critically important)
This page does not use a frameset.
Mobile optimization
(Somewhat important)
This page loads 21 JavaScript files. This may affect the load time negatively.
A viewport "width=device-width, initial-scale=1.0" is provided.
At least one Apple touch icon is specified.
Bold and strong tags
(Somewhat important)
The usage of strong and bold tags is perfect. We recommend the use of up to 17 tags for this page.
Image SEO
(Somewhat important)
7 images have no alt attribute. The content of alt attributes is used by search engines.
Social Networks
(Nice to have)
This page is optimized perfectly for social networks.
Additional markup
(Nice to have)
No additional page markup was found.
HTTPS
(Somewhat important)
This website uses HTTPS to protect privacy and integrity of the exchanged data.
All included files are also transferred via HTTPS.

Media list

URLAlt attributeTitle
...4/03/Logo-Final-weiss-e1710408419594.pngCom-Sys logo
...ds/2024/03/Logo-Final-e1710408472547.pngCom-Sys logo
/wp-content/uploads/2024/03/Frame-6-1.svgNavigation telephone logo
/wp-content/uploads/2024/10/Suche.svgNavigation search logo
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...comsys-website/dist/assets/img/arrow.svgArrow Icon
...2024/04/AdobeStock_458756919-scaled.webpNo alt attribute provided
...content/uploads/2024/03/Frame-6-1-02.svgÜber uns icon
...content/uploads/2024/03/Frame-6-1-03.svgJobs icon
/wp-content/uploads/2024/03/Frame-6-1.svgKontakt icon
...2024/04/AdobeStock_356666339-scaled.webpNo alt attribute provided
...content/uploads/2024/03/Frame-6-1-04.svgEvents icon
...content/uploads/2024/03/Frame-6-1-05.svgNews & Blog icon
...ds/2024/03/Logo-Final-e1710408472547.pngCom-SYS logo
/wp-content/uploads/2024/04/Frame-7.svgNo alt attribute provided
...Sys-Bilder-Medienmitteilung-Var-10-1.jpgNo alt attribute provided
...-HeroUebersicht-NewsBlog-WordPress-9.pngNo alt attribute provided
...025/01/Blogbeitragsbild-unter-NEWS-1.pngNo alt attribute provided
...25/02/Blog-Beitragsbild-unter-NEWS-1.pngNo alt attribute provided
...ent/uploads/2024/04/leiterbahnen-cta.svgCom-Sys gestaltete Leiterbahnen Wegweiser Route
...ds/2024/03/Logo-Final-e1710408472547.pngComsys logo

Page structure

H1 heading
(Critically important)
Your compass to cybersecurity.
The H1 heading is perfect.
Headings
(Important)
The structure of headings is missing one or more levels. Do not skip heading levels.

Heading structure

Heading levelContent
H1 Your compass to cybersecurity.
H2 360° Cybersecurity Portfolio
H2 Cyber Defence Services
H2 Passive IT-Infrastructure
H2 Dürfen wir Sie begleiten?
H2 World of Com-Sys in Zahlen
H2 Aktuelles
H2 Haben Sie noch Fragen?
H2 Kontaktieren Sie uns
H2 Jetzt abonnieren
H2 Footer
H4 Cyberangriff! Und jetzt? Incident Response Retainer
H4 InfoGuard übernimmt die deutsche Communication Systems
H4 Exposed: Game Over für Schwachstellen mit Exposure Management
H5 Com-Sys & InfoGuard: Gemeinsam an die Spitze der DACH-Region
H5 Wir freuen uns, wenn Sie sich melden!
Some anchor texts are used more than once.
The number of internal links is ok.
None of the anchor texts is too long.
All internal links are not using dynamic parameters.
There are 9 external links on this page.
LinkAttributesAnchor text
https://com-sys.de/IMG-ALT Com-Sys logo
https://com-sys.de/route/Route
/loesungen-cybersecurity-servi...Portfolio
https://com-sys.de/jobs/Com-Sys Jobs
/loesungen-cybersecurity-servi...Cyber Defence
/loesungen-cybersecurity-servi...Managed Detection & Response (MDR)
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Comprehensive Incident Response & Forensics
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Hunting & Intelligence
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Security Operations
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Managed Security & Network
/loesungen-cybersecurity-servi...Enterprise Networking & Security
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Detection & Automation
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Endpoint Security
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...24/7 Managed & Support Services
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Professional Services
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Security Consulting
/loesungen-cybersecurity-servi...Cyber Security Strategy
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Governance, Risk & Compliance
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Security Architecture & Design
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Human-Centered Security
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Cybersecurity Assessments
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Incident Response Services
/loesungen-cybersecurity-servi...Incident Response & Recovery
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Forensics
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Crisis & Incident Response Readiness
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Penetration Testing & Red Teaming
/loesungen-cybersecurity-servi...Adversary Simulation Services
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Penetration Testing
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Research & Development
IMG-ALT Arrow Icon
/loesungen-cybersecurity-servi...Cloud Security
/loesungen-cybersecurity-servi...Cloud Competence Center
IMG-ALT Arrow Icon
/com-sys-connect-innovative-in...Com-Sys Connect
/com-sys-connect-innovative-in...Data-Center & Infrastruktur
https://com-sys.de/events/Unsere Webinare Cybersecurity Expertise to go & to keep! Jetzt anmelden
https://com-sys.de/ueber-uns/Über uns Entdecken Sie die World of Com-Sys
IMG-ALT Über uns icon
https://com-sys.de/jobs/Jobs Ausbildung und Karriere
IMG-ALT Jobs icon
https://com-sys.de/kontakt/Kontakt Wir sind für Sie erreichbar!
IMG-ALT Kontakt icon
https://com-sys.de/news-blog/Neues aus der World of Com-Sys Alle News und Artikel auf einen Blick. Jetzt entdecken
https://com-sys.de/events/Events Erleben Sie die World of Com-Sys
IMG-ALT Events icon
https://com-sys.de/news-blog/News & Blog Neuigkeiten und Insights
IMG-ALT News & Blog icon
https://com-sys.de/IMG-ALT Com-SYS logo
https://com-sys.de/route/Text duplicate Route
/loesungen-cybersecurity-servi...Text duplicate Portfolio
/loesungen-cybersecurity-servi...Text duplicate Cyber Defence
/loesungen-cybersecurity-servi...Anchor Text duplicate Managed Detection & Response (MDR)
/loesungen-cybersecurity-servi...Anchor Text duplicate Comprehensive Incident Response & Forensics
/loesungen-cybersecurity-servi...Anchor Text duplicate Hunting & Intelligence
/loesungen-cybersecurity-servi...Anchor Text duplicate Security Operations
/loesungen-cybersecurity-servi...Text duplicate Managed Security & Network
/loesungen-cybersecurity-servi...Anchor Text duplicate Enterprise Networking & Security
/loesungen-cybersecurity-servi...Anchor Text duplicate Detection & Automation
/loesungen-cybersecurity-servi...Anchor Text duplicate Endpoint Security
/loesungen-cybersecurity-servi...Anchor Text duplicate 24/7 Managed & Support Services
/loesungen-cybersecurity-servi...Anchor Text duplicate Professional Services
/loesungen-cybersecurity-servi...Text duplicate Security Consulting
/loesungen-cybersecurity-servi...Anchor Text duplicate Cyber Security Strategy
/loesungen-cybersecurity-servi...Anchor Text duplicate Governance, Risk & Compliance
/loesungen-cybersecurity-servi...Anchor Text duplicate Security Architecture & Design
/loesungen-cybersecurity-servi...Anchor Text duplicate Human-Centered Security
/loesungen-cybersecurity-servi...Anchor Text duplicate Cybersecurity Assessments
/loesungen-cybersecurity-servi...Text duplicate Incident Response Services
/loesungen-cybersecurity-servi...Anchor Text duplicate Incident Response & Recovery
/loesungen-cybersecurity-servi...Anchor Text duplicate Forensics
/loesungen-cybersecurity-servi...Anchor Text duplicate Crisis & Incident Response Readiness
/loesungen-cybersecurity-servi...Text duplicate Penetration Testing & Red Teaming
/loesungen-cybersecurity-servi...Anchor Text duplicate Adversary Simulation Services
/loesungen-cybersecurity-servi...Anchor Text duplicate Penetration Testing
/loesungen-cybersecurity-servi...Anchor Text duplicate Research & Development
/loesungen-cybersecurity-servi...Text duplicate Cloud Security
/loesungen-cybersecurity-servi...Text duplicate Cloud Competence Center
/com-sys-connect-innovative-in...Text duplicate Com-Sys Connect
/com-sys-connect-innovative-in...Text duplicate Data-Center & Infrastruktur
https://com-sys.de/ueber-uns/Über uns
https://com-sys.de/jobs/Jobs
https://com-sys.de/kontakt/Kontakt
https://com-sys.de/events/Events
https://com-sys.de/news-blog/News & Blog
https://www.instagram.com/worl...External Subdomain No Text
https://www.facebook.com/comsy...External Subdomain No Text
https://de.linkedin.com/compan...External Subdomain No Text
https://com-sys.de/infoguard/Zur Pressemitteilung
/loesungen-cybersecurity-servi...New window Lösungen entdecken!
https://com-sys.de/cyber-defence/Services entdecken!
/com-sys-connect/Connect entdecken!
https://com-sys.de/route/Zur Com-Sys Route
https://com-sys.de/ueber-uns/Mehr erfahren
/cyberangriff-und-jetzt-incide...Blog Cyberangriff! Und jetzt? Incident Response Retainer von Ann Jasmin Wiesen 5 min Lesezeit
https://com-sys.de/infoguard/News InfoGuard übernimmt die deutsche Communication Systems von Audrey Sely-Kaempfer 5 min Lesezeit
/game-over-fuer-schwachstellen...Blog Exposed: Game Over für Schwachstellen mit Exposure Management von Ann Jasmin Wiesen 8 min Lesezeit
https://com-sys.de/news-blog/Alle Beiträge
/privacy-policy/Datenschutzrichtlinien
/privacy-policy/Text duplicate Datenschutzrichtlinien
https://com-sys.de/IMG-ALT Comsys logo
/loesungen-cybersecurity-servi...Com-Sys Cybersecurity Services
/com-sys-connect-innovative-in...Text duplicate Com-Sys Connect
https://com-sys.de/ueber-uns/Text duplicate Über uns
https://com-sys.de/news-blog/Text duplicate News & Blog
https://com-sys.de/kontakt/Text duplicate Kontakt
https://www.instagram.com/worl...New window External Subdomain No Text
https://www.facebook.com/comsy...New window External Subdomain No Text
https://de.linkedin.com/compan...New window External Subdomain No Text
https://com-sys.de/impressum/Impressum
/privacy-policy/Datenschutz
/privacy-policy/Datenschutzerklärung
https://com-sys.de/impressum/Text duplicate Impressum
https://www.cookielay.com/New window External Subdomain Powered by Cookielay
https://www.cookielay.com/priv...New window External Subdomain www.cookielay.com/privacy-policy
https://www.cookielay.com/imprintNew window External Subdomain www.cookielay.com/imprint

Server configuration

HTTP redirects
(Critically important)
This page redirects to "https://com-sys.de/"
HTTP header
(Important)
No X-Powered HTTP header is sent.
The web server transmits the web page (HTML) in compressed form.
Performance
(Somewhat important)
This page loads 8 CSS files. This may affect the page load time negatively.
This page loads 21 JavaScript files. This may affect the load time negatively.
The page response time is excellent with 0.28 seconds.
The file size of the HTML document is fine (193 kB).

HTTP Response Header

NameValue
dateSun, 11 May 2025 20:25:25 GMT
serverApache
strict-transport-securitymax-age=63072000; includeSubDomains; preload
x-pingbackhttps://com-sys.de/xmlrpc.php
link<https://com-sys.de/wp-json/>; rel="https://api.w.org/"
varyAccept-Encoding
content-encodinggzip
x-content-type-optionsnosniff
x-xss-protection1; mode=block
x-frame-optionsSAMEORIGIN
content-length36930
content-typetext/html; charset=UTF-8
statuscode200
http_versionHTTP/1.1

External factors

This website has excellent links from other websites.
This page has backlinks from 74 referring domains.
This page has 119 backlinks.
This page has backlinks from 65 different ip addresses.

Links from Wikipedia

No links from Wikipedia were found.

Robots.txt

# START YOAST BLOCK
# ---------------------------
User-agent: *
Disallow:

Sitemap: https://com-sys.de/sitemap_index.xml
# ---------------------------
# END YOAST BLOCK

Search preview

com-sys.de
Your compass to cybersecurity | Com-Sys
Als Navigatoren der IT-Sicherheitslandschaft bieten wir Ihnen Orientierung in der komplexen Cybersecurity-Welt...

Most important keywords

Following keywords were found. You can check the keyword optimization of this page for each keyword.

KeywordResultRecheck
Security77%Check
Cybersecurity77%Check
Cyber Security77%Check
Com-Sys70%Check
compass62%Check
Cyber Defence60%Check
cybersecurity services60%Check
Cloud Security58%Check
Security Network58%Check
Security Consulting58%Check

Automatically check com-sys.de including all subpages at once!

Try for free
Guaranteed free of charge during trial period.

Cookie Policy

We use cookies to make our site work and also for analytics and advertising purposes. You can enable or disable optional cookies as desired. See the following links for more information.

We need these so the site can function properly

So we can better understand how visitors use our website

So we can serve you tailored ads and promotions