Concepts
This document introduces the core concepts used throughout the Simplified Solutions platform. Understanding these terms will make it easier to navigate the system, configure your environment, and interpret what you see on the dashboard. These concepts are intentionally simple and consistent, and they are used the same way across all features and product tiers.
Organizations
An Organization represents a single company, nonprofit, church, or other business entity that you want to protect. All devices, installers, policies, and activity are grouped under an Organization.
Most customers will only need one Organization. However, the system supports multiple Organizations for cases where devices must be kept fully separate, such as managing multiple businesses or environments.
Billing, reporting, and device management are all scoped to the Organization level, ensuring that data and activity remain clearly separated.
Devices
A Device is any workstation or server that has been enrolled in Simplified Solutions by installing an agent. This includes desktop computers, laptops, and servers running supported operating systems.
Each Device runs a lightweight background agent that applies security policies, monitors system health, and reports status back to the platform. Devices are counted individually and are managed independently, even if they belong to the same user.
When a Device is removed or the agent is uninstalled, it stops reporting and is no longer considered active within the system.
Installers
Installers are how Devices are enrolled into Simplified Solutions. An installer is generated from within the platform and is tied to a specific Organization and configuration.
When an installer is run on a device, that device is automatically registered, secured, and monitored according to the policies associated with the Organization. No manual enrollment steps are required.
Installers are operating-system specific and can be reused across multiple devices, making it easy to onboard new systems as your organization grows.
Policies
Policies define how devices are managed and protected. These include settings related to patching behavior, security protections, monitoring rules, and backups (depending on your product tier).
Policies are managed centrally by Simplified Solutions and are applied automatically to enrolled devices. This ensures consistent protection without requiring customers to configure or maintain detailed technical settings.
AV / NGAV
AV (Antivirus) and NGAV (Next-Generation Antivirus) refer to technologies used to detect and stop malicious software.
Traditional antivirus tools primarily rely on known signatures to identify threats. NGAV solutions go further by using behavioral analysis, machine learning, and real-time monitoring to detect suspicious activity, including threats that have never been seen before.
Simplified Solutions uses NGAV technologies to provide stronger protection against modern attacks such as ransomware, fileless malware, and zero-day exploits.
Backups
Backups protect your data by creating secure copies that can be restored if files are lost, damaged, or encrypted by malware.
When backups are enabled, protected devices regularly back up important data according to predefined schedules and retention policies. This allows data to be recovered in the event of hardware failure, accidental deletion, or security incidents.
Backups operate automatically in the background and are designed to provide protection without interfering with normal day-to-day work.
Dashboard
The Dashboard provides a centralized view of your Organization and Devices. It shows device status, health indicators, and recent activity in a clear and consistent format.
The dashboard is intended to provide visibility and confidence rather than requiring constant interaction. Most customers use it to confirm that systems are protected and to quickly identify devices that may need attention.
Automation
Automation is a core principle of the Simplified Solutions platform. Tasks such as device enrollment, policy enforcement, updates, and monitoring are designed to happen automatically once a device is installed.
This approach reduces manual effort, minimizes human error, and ensures that protections remain in place over time, even as devices change or new threats emerge.