Your AI agents forget everything between sessions. UAML Memory gives them persistent, secure, auditable memory — so they get smarter with every interaction.
Already a customer? Log in to your portal →
Everything your AI agents need to remember, secured and organized.
Your data stays on your hardware. SQLite-backed, zero cloud dependencies. Runs on everything from Raspberry Pi to enterprise servers.
Built-in compliance auditor, consent tracking, DPIA generator, PII sanitization. Ready for ISO 27001, GDPR Article 35, and regulatory audits.
Share knowledge across agents and machines. Federation Hub syncs memory with role-based access control and approval gates.
ML-KEM-768 post-quantum encryption (NIST FIPS 203), key escrow with secret sharing, FIDO2 hardware auth. Future-proof your data.
Your data deserves military-grade protection. We deliver it by default.
ML-KEM-768 (NIST FIPS 203) — quantum-resistant encryption protects your data against future threats.
Built-in compliance auditor, consent tracking, DPIA generator, and breach register.
Every operation logged with timestamps. Exportable HTML/JSON reports for any audit.
Firewall rules, AV exclusions, disk encryption wizard — all from one interface.
Temporary, fully audited AI access to host OS with instant kill switch.
Data classified by sensitivity level with separate access rules per layer.
Three steps to persistent AI memory.
One command: pip install uaml-memory — that's it. No servers, no Docker, no cloud accounts.
Run uaml init to create your memory database. Choose your modules, set up policies.
Your agents now have persistent memory. They learn, recall, and reason across sessions — automatically.
Start free. Scale when you're ready. No surprises.
🎉 Launch Special: 14-day free trial with FULL features on all plans — no credit card required!
| Feature | Free | Pro €8 | Enterprise €99 | Custom |
|---|---|---|---|---|
| Memory Storage | Unlimited | Unlimited | Unlimited | Unlimited |
| Max Agents | 1 | 5 | 50 | Unlimited |
| Three-Layer Recall | ✓ | ✓ | ✓ | ✓ |
| Neo4j Knowledge Graph | — | ✓ | ✓ | ✓ |
| Multi-Agent Sharing | — | ✓ | ✓ | ✓ |
| Temporal Reasoning | — | ✓ | ✓ | ✓ |
| Audit Trail | — | ✓ | ✓ | ✓ |
| Compliance Export | — | — | ✓ | ✓ |
| SLA Guarantee | — | — | ✓ | ✓ |
| On-Premise Deployment | — | — | — | ✓ |
| Support | Community | Priority | Dedicated | Custom |
All data stays on your machine. Memory storage is unlimited on all plans. All prices include VAT.
UAML (Universal Agent Memory Layer) is a memory infrastructure for AI agents. It gives your agents persistent, structured memory with 5 types (episodic, semantic, procedural, reasoning, associative) — modeled after human cognition. Your agents remember what they've learned, decisions they've made, and context from past interactions.
UAML Memory is proprietary software by GLG, a.s. The Community edition is free for personal, non-commercial use. Commercial use requires a paid subscription. Paid tiers unlock additional features (Focus Engine, federation, security configurator, PQC encryption) and include professional support. Licenses are time-limited per subscription period. After expiration, paid features are locked — your data remains accessible.
Absolutely. The Community tier is fully functional — not a trial, not a demo. You get the full memory engine, post-quantum encryption, CLI, and Python API. Install with pip install uaml-memory and start building immediately.
UAML is local-first. Your data stays on your hardware in a SQLite database. There are zero cloud dependencies — no data ever leaves your machine unless you explicitly configure federation or export. You own your data completely.
Yes. UAML includes built-in GDPR tools: consent tracking, right to erasure (selective purge), data portability (export), PII auto-detection and sanitization, DPIA generator, and breach notification register. It's designed for organizations that need to demonstrate compliance. Learn more →
UAML uses ML-KEM-768 (formerly CRYSTALS-Kyber), a lattice-based key encapsulation mechanism standardized by NIST as FIPS 203. This protects your data against both classical and future quantum computer attacks. Key escrow with Shamir's secret sharing provides recovery without single points of failure.