M Media Software Lab - self-hosted infrastructure software for regulated environments

M Media Software Lab

Built for Environments
Where Data Stays Put.

M Media produces self-hosted infrastructure software designed for air-gapped deployment, zero cloud dependency, and no telemetry. Log data, agent actions, and audit records stay inside your network. No relay, no SaaS account required, no runtime call home.

Products

Products for Regulated Environments

Both products ship as standalone binaries. No container orchestration required, no cloud account, no external dependency at runtime.

SiftLog Platform

Self-hosted log correlation and monitoring daemon. Ingests log streams from every source in your infrastructure, merges them in real time, and surfaces failure origins automatically. Runs entirely inside your network - no cloud relay, no SaaS account, no telemetry. SQLite-backed history, TUI, and compliance logging built in.

Air-gapped No cloud relay Compliance logging $999/server/yr
SiftLog Platform details

Agent Action Ledger

AI agent governance and accountability gateway. Sits between agents and sensitive integrations - SMTP, webhooks, APIs - enforces server-side permissions, and records every action in a cryptographically-linked, tamper-evident audit ledger. Hash-chained records, bcrypt agent key verification, SQLite-backed queryable history. Audit trail compatible with HIPAA, SOC 2, and FedRAMP documentation requirements.

Tamper-evident HIPAA compatible SOC 2 compatible FedRAMP compatible
Agent Action Ledger details

Procurement

  • UEI: M8H4W9L8K8P4
  • EIN on file
  • NAICS: 541511, 541512, 541519
  • Purchase orders and net terms accepted
  • Air-gapped license activation available
  • Vendor onboarding support included

Both products

  • No telemetry
  • No cloud relay
  • No SaaS dependency
  • Single binary, no runtime dependencies
  • Data never leaves your infrastructure
  • Startup integrity check before first request

Evaluating for enterprise deployment? We answer technical questions directly - no sales process required.

Contact us

Audience

Who Uses This Software

Air-gapped and network-restricted environments

You operate infrastructure that cannot connect to the internet, or has made a deliberate decision not to. You need log visibility and a complete audit record without introducing an external dependency or a persistent outbound connection. SiftLog Platform runs entirely inside your perimeter. It does not call home. There is no license server to reach during operation.

Organizations deploying AI agents in regulated contexts

You are running AI agents against production systems - APIs, email, internal tooling - and you need a verifiable record of what those agents did and when. Agent Action Ledger sits between the agent and the integration, enforces permissions server-side, and produces a hash-chained audit record. If an auditor asks what an agent did on a given date, you have a queryable answer. If someone tampers with the record, the chain breaks and the tampering is detectable.

Procurement and compliance leads evaluating vendors

You need a registered vendor, a UEI, NAICS codes, and answers to technical questions that don't require a sales call. That information is on this page. If you have specific questions about deployment architecture, audit trail format, or license activation for isolated environments, use the contact form. You will get a direct answer.

Deployment

How Deployment Works

No installer wizard, no account creation, no cloud onboarding flow. The process is the same for every platform.

1

Download the binary

Single binary for your platform: Linux amd64, Linux arm64, Windows, macOS Intel, macOS Silicon. No package manager required. No dependencies to install.

2

Configure via config file

All configuration is file-based. No GUI required. Set your log sources, retention policy, TLS certificates, and access controls in a single config. Documentation covers every field.

3

Activate the license

Standard activation requires a one-time outbound connection to the license server. Air-gapped activation is available for enterprise deployments - license file is issued offline and validated locally at startup. No recurring connection required.

4

Run

The daemon starts, runs an integrity check, and begins accepting requests. If the integrity check fails, the daemon does not start. There is no partial-start failure mode.

Compliance

What the Software Produces for Auditors

These are not certification claims. This is what the software outputs and what an auditor or reviewing authority can examine.

SiftLog Platform

Produces timestamped, structured log records with source attribution for every ingested stream. The full history is queryable via the built-in TUI or REST API. Retention policy is operator-controlled. No records are transmitted externally. The operator owns the data store.

Agent Action Ledger

Produces a hash-chained record of every agent action: agent identity, action taken, target integration, timestamp, and result. Each record is cryptographically linked to the previous. Any modification to a record - including deletion - breaks the chain at that point and is detectable on the next read. Records are stored in SQLite and are queryable directly without proprietary tooling.

Operational security note

Neither product transmits telemetry. There is no vendor-side copy of your log data, no cloud record of agent actions, and no external service that holds information about your infrastructure. There is nothing for a third party to subpoena that you do not already control.

Procurement

Vendor Information

M Media Software Lab is registered for federal procurement. Purchase orders and net terms are available for qualifying organizations.

Unique Entity ID (UEI) M8H4W9L8K8P4
EIN On file
NAICS Codes 541511, 541512, 541519
Purchase Orders Accepted - net terms available for qualifying organizations
License Activation Air-gapped activation available for enterprise deployments
Vendor Onboarding Onboarding support included with enterprise licenses

Architecture

Architecture Commitments

These are properties of the software, not sales claims. They are verifiable in the binary behavior and the source where applicable.

  • No telemetry. The software does not transmit usage data.
  • No cloud relay. Data does not transit external infrastructure.
  • No SaaS dependency. No external account required at runtime or after.
  • Logs and audit records never leave customer infrastructure.
  • Single binary per platform. No runtime dependencies, no install scripts.
  • Startup integrity check runs before the daemon accepts any requests.
  • TLS required in production. Plaintext is rejected by default.

Contact

Procurement and Licensing Inquiries

For procurement inquiries, vendor onboarding, enterprise licensing, and air-gapped deployment requirements - use the contact form and select "Enterprise / Procurement" as the subject.

Contact us