M Media Software Lab
M Media produces self-hosted infrastructure software designed for air-gapped deployment, zero cloud dependency, and no telemetry. Log data, agent actions, and audit records stay inside your network. No relay, no SaaS account required, no runtime call home.
Products
Both products ship as standalone binaries. No container orchestration required, no cloud account, no external dependency at runtime.
Self-hosted log correlation and monitoring daemon. Ingests log streams from every source in your infrastructure, merges them in real time, and surfaces failure origins automatically. Runs entirely inside your network - no cloud relay, no SaaS account, no telemetry. SQLite-backed history, TUI, and compliance logging built in.
SiftLog Platform detailsAI agent governance and accountability gateway. Sits between agents and sensitive integrations - SMTP, webhooks, APIs - enforces server-side permissions, and records every action in a cryptographically-linked, tamper-evident audit ledger. Hash-chained records, bcrypt agent key verification, SQLite-backed queryable history. Audit trail compatible with HIPAA, SOC 2, and FedRAMP documentation requirements.
Agent Action Ledger detailsProcurement
Both products
Evaluating for enterprise deployment? We answer technical questions directly - no sales process required.
Contact usAudience
You operate infrastructure that cannot connect to the internet, or has made a deliberate decision not to. You need log visibility and a complete audit record without introducing an external dependency or a persistent outbound connection. SiftLog Platform runs entirely inside your perimeter. It does not call home. There is no license server to reach during operation.
You are running AI agents against production systems - APIs, email, internal tooling - and you need a verifiable record of what those agents did and when. Agent Action Ledger sits between the agent and the integration, enforces permissions server-side, and produces a hash-chained audit record. If an auditor asks what an agent did on a given date, you have a queryable answer. If someone tampers with the record, the chain breaks and the tampering is detectable.
You need a registered vendor, a UEI, NAICS codes, and answers to technical questions that don't require a sales call. That information is on this page. If you have specific questions about deployment architecture, audit trail format, or license activation for isolated environments, use the contact form. You will get a direct answer.
Deployment
No installer wizard, no account creation, no cloud onboarding flow. The process is the same for every platform.
Single binary for your platform: Linux amd64, Linux arm64, Windows, macOS Intel, macOS Silicon. No package manager required. No dependencies to install.
All configuration is file-based. No GUI required. Set your log sources, retention policy, TLS certificates, and access controls in a single config. Documentation covers every field.
Standard activation requires a one-time outbound connection to the license server. Air-gapped activation is available for enterprise deployments - license file is issued offline and validated locally at startup. No recurring connection required.
The daemon starts, runs an integrity check, and begins accepting requests. If the integrity check fails, the daemon does not start. There is no partial-start failure mode.
Compliance
These are not certification claims. This is what the software outputs and what an auditor or reviewing authority can examine.
Produces timestamped, structured log records with source attribution for every ingested stream. The full history is queryable via the built-in TUI or REST API. Retention policy is operator-controlled. No records are transmitted externally. The operator owns the data store.
Produces a hash-chained record of every agent action: agent identity, action taken, target integration, timestamp, and result. Each record is cryptographically linked to the previous. Any modification to a record - including deletion - breaks the chain at that point and is detectable on the next read. Records are stored in SQLite and are queryable directly without proprietary tooling.
Neither product transmits telemetry. There is no vendor-side copy of your log data, no cloud record of agent actions, and no external service that holds information about your infrastructure. There is nothing for a third party to subpoena that you do not already control.
Procurement
M Media Software Lab is registered for federal procurement. Purchase orders and net terms are available for qualifying organizations.
| Unique Entity ID (UEI) | M8H4W9L8K8P4 |
| EIN | On file |
| NAICS Codes | 541511, 541512, 541519 |
| Purchase Orders | Accepted - net terms available for qualifying organizations |
| License Activation | Air-gapped activation available for enterprise deployments |
| Vendor Onboarding | Onboarding support included with enterprise licenses |
Architecture
These are properties of the software, not sales claims. They are verifiable in the binary behavior and the source where applicable.
Contact
For procurement inquiries, vendor onboarding, enterprise licensing, and air-gapped deployment requirements - use the contact form and select "Enterprise / Procurement" as the subject.
Contact us