The average MSP runs on 10–15% net margins. Vendor tools alone eat 29% of revenue. The typical stack? 19+ tools, most of them overlapping, underused, or both. The margin compression killing mid-market MSPs in 2026 traces back to one root cause: a bloated, unexamined MSP stack that grew by accident instead of by design.

image

So, here's the five-step process that MSP owners and CTOs use to find hidden spend. We built a free MSP Stack Audit spreadsheet template so you can run the whole process in one sitting.

image

If you haven't reviewed your managed service provider tools in the last 12 months, start here.

The 5 Core Layers of an MSP Stack

Most managed service provider tools fall into one of five functional layers – PSA, RMM, Security, Backup and Disaster Recovery, and Documentation.

PSA (Professional Services Automation)

Your PSA is the business layer. Ticketing, time tracking, SLA enforcement, invoicing, contract management – if it touches a client relationship or a billable hour, it runs through the PSA. ConnectWise Manage, Autotask, HaloPSA, and SuperOps are the names you'll see most in the community. The must-have here is clean workflow automation. If your techs are manually categorizing tickets or copying data between systems, the PSA is failing them.

RMM (Remote Monitoring and Management)

The foundation of the PSA RMM stack. Your RMM sits on every managed endpoint and tells you what's happening before your client calls you about it. Patch management, remote access, scripting, health monitoring – this is where most MSPs spend the most per seat. NinjaOne, ConnectWise Automate, and TacticalRMM are common in the space. Red flag: if your technicians are logging into the RMM only to remote into endpoints and nothing else, you're paying for a $50/seat tool and using it as a $5/seat one.

Security

The MSP security stack has gotten dense – and expensive. At minimum, you need endpoint detection and response (EDR), DNS filtering, and some form of security event visibility. Best-in-class MSPs are moving toward managed detection and response (MDR) delivered as a bundled client service. If you're still running antivirus-only in 2026, the audit isn't optional.

Backup and Disaster Recovery

BDR is non-negotiable. The question is whether you're running one BDR platform that covers cloud, on-prem, and M365/Google Workspace – or three separate tools to cover what one good platform should handle. Datto, Acronis, Veeam, and Axcient are the regulars. More than two BDR tools in a single stack is almost always a consolidation opportunity.

Documentation

Hudu, IT Glue, and plain-text wikis all serve the same function: keeping institutional knowledge out of people's heads and into a searchable system. Documentation platforms are often the lowest-cost layer and the most underused. If your techs aren't using it, the problem is process, not the tool.

image

The MSP Stack Audit Framework – 5 Steps

This is the section that earns your time. Run this audit quarterly. It takes two to four hours the first time and under an hour on every repeat.

Step 1: Inventory Everything

Pull every tool your business pays for. Not just the obvious ones – include Microsoft 365 add-ons, standalone monitoring tools, contract management software, security awareness training platforms, and anything your team subscribed to on a trial that never got cancelled. List each tool with four data points:

  • Monthly cost (actual invoiced cost, not list price)
  • Cost basis (per seat, per endpoint, per client, flat rate)
  • Contract expiry date
  • Who owns the renewal decision

Most MSPs doing this for the first time find at least one tool they forgot they were paying for. That's not embarrassing – it's why you do the audit.

Step 2: Map Every Tool to a Function

Take your inventory list and assign each tool to one of the five layers: PSA, RMM, Security, Backup, or Documentation. Add a sixth category – "Other/Admin" – for tools that don't fit cleanly (billing software, HR tools, internal comms).

If two tools land in the same category, that's a potential overlap. If a layer has no tool assigned to it, that's a coverage gap. Both are action items.

Step 3: Score Each Tool for ROI

For each tool, answer three questions:

  1. How many technician hours per month does this save? (Estimate if you have to – zero is a valid answer.)
  2. How many tickets per month does it deflect or auto-resolve?
  3. Can you name a specific client outcome it contributed to in the last 90 days?

image

If the answer to all three is "I don't know" or "none," the tool isn't earning its keep. That doesn't mean cut it immediately – but it means it belongs in the candidate pile.

Step 4: Flag Overlaps

This is where the money is. Look for:

  • Two tools doing the same job (e.g., two RMM agents running on the same endpoints)
  • Features in Tool A that duplicate what you're paying Tool B to do
  • Capabilities you're paying for in an enterprise tier that your team doesn't use

The most common overlaps MSPs find: a PSA with built-in documentation they're not using, running alongside a separate documentation tool – and an RMM with remote access built in, running alongside a separate remote access license.

Step 5: Cut, Keep, or Consolidate

Every tool gets one of three decisions:

  • Keep – Core function, actively used, ROI is clear
  • Cut – Redundant, unused, or functionality covered elsewhere
  • Consolidate – Valid function, but replaceable by a feature in a tool you're already paying for

image

Set a target. A good starting point: reduce total MSP stack cost to under $25 per endpoint per month. If you're above $30, you likely have consolidation opportunities worth $500 to $2,000 per month at MSP scale.

Once you've flagged tools to cut or consolidate, the next question is what to replace them with. Before signing another vendor contract, check whether an open-source alternative exists. The OpenMSP tools directory catalogs open-source replacements for most commercial MSP tools – RMM, security, monitoring, documentation, and more. It's the fastest way to find options that don't come with per-seat pricing or annual lock-ins.

Compare your current stack against industry benchmarks →

image

Red Flags in Your Current MSP Stack

These are signals worth acting on. If three or more apply to your current setup, the audit is overdue.

  • You don't know your total monthly tool spend off the top of your head. If you can't estimate it within 20%, the stack has grown beyond what you're actively managing.
  • More than two tools in the same functional layer. PSA, RMM, security, backup, docs – each should have one primary tool, maybe one supplement with a clear reason for existing.
  • Any tool that requires a manual export to generate a useful report. In 2026, if it doesn't have a live dashboard your techs actually check, it's a data silo.
  • Per-seat pricing on tools where your seat count has doubled since you signed. Per-seat models scale against you as you grow. Check the effective cost per endpoint versus when you first signed the contract.
  • Tools with annual contracts and no integration with your PSA. If it doesn't talk to your PSA, someone is doing manual data entry. That's billable time you're eating internally.
  • Features your team needed to be trained on twice. If technicians keep re-learning the same platform, adoption has failed. A tool nobody uses correctly is a cost center.
  • Security awareness training you bought and then nobody completed. This one costs money and creates compliance liability if it sits unused.

The Real Cost of MSP Tool Bloat

The average MSP spends 29% of revenue on vendor tools – roughly $734K for a $2.5M shop. At the endpoint level, the industry benchmark sits at about $24.50 per endpoint in tooling costs. At a billing rate of $150 per user per month, that leaves around $125 to cover technician labor (another 24% of revenue), overhead, and profit. The math works – barely – when the stack is tight.

image

When MSP tool sprawl sets in, that tooling cost climbs. At $35 per endpoint, you've consumed an extra $10.50 that has to come from somewhere. For a 300-endpoint MSP, that's $3,150 per month in compressed margin. Over a year: $37,800 that should have been profit.

The drivers of MSP vendor sprawl follow a pattern: a problem appears, a vendor has a point solution, a tech signs up on a trial, the trial converts to a paid subscription, nobody cancels it when a better feature ships in the RMM six months later. Multiply that pattern by four years and a growing team and you get the average mid-market MSP stack in 2026: 19+ vendor tools, each with its own billing portal, support relationship, and renewal cycle.

AI is making this worse. Every security vendor, every RMM, every PSA is now selling an "AI add-on." Some of those add-ons overlap with each other. Some overlap with tools you already own. Before you approve another AI feature purchase, run it through the same five-step framework. The question isn't whether AI is useful – it is – the question is whether you need to pay a separate vendor for it or whether something you already own covers the job.

Vendor sprawl also kills integration. Every additional tool is another API dependency, another webhook to maintain, another failure point when an update breaks the connection. The MSPs with the lowest overhead aren't the ones with the most tools. They're the ones who made consolidation a discipline.

What a Lean, High-Margin MSP Stack Looks Like

The tightest stacks in the community share three characteristics: one platform covering multiple functional layers, a consolidated security offering with clear MDR coverage, and tooling that doesn't charge per seat for capabilities the whole team uses equally.

A lean MSP platform consolidation looks roughly like this:

  • One unified RMM + PSA platform (or two deeply integrated tools) handling ticketing, monitoring, patch management, remote access, and scripting
  • One security platform covering EDR, DNS filtering, and event logging – not three separate vendor contracts
  • One BDR platform with cloud and on-prem coverage built in
  • One documentation platform with enforced usage (this requires process, not just software)

The goal isn't to run the fewest tools. The goal is to run only tools where the ROI is clear and the integration is tight. The best MSP tools aren't necessarily the most feature-rich – they're the ones your team uses correctly and that talk to each other without intervention.

OpenFrame, Flamingo's core platform, covers RMM, ticketing, monitoring, scripting, and remote access with no per-seat license fees. It runs cloud, on-prem, or hybrid – your call, not the vendor's. For MSPs tired of per-seat pricing that scales against them as they grow, it's worth benchmarking against what you're currently paying.

See how OpenFrame fits into a lean MSP stack →

AI and the Future of the MSP Stack

AI is reshaping the MSP tech stack – but the benefit is only real for shops that wire it into workflow, not bolt it on as a standalone product.

The MSPs seeing measurable returns from AI in 2026 are using it for three things: L1 ticket auto-resolution (password resets, connectivity checks, standard runbook execution), anomaly detection in monitoring feeds, and knowledge base population from resolved tickets. These aren't flashy use cases – they're the ones that reduce technician time per ticket in a way you can measure.

The risk is treating AI like a separate purchase category. When five different vendors are each selling an "AI copilot" for their product, you end up with AI sprawl layered on top of tool sprawl. The better move: audit what your existing platforms can do with native AI features before signing any new AI-specific vendor contracts. Most MSPs find that 60 to 70% of what they'd buy from an AI point solution is already available in their RMM or PSA – they just haven't turned it on.

AI should shrink your labor cost per ticket. If it's not doing that measurably after 90 days, the spend isn't justified yet.

Frequently Asked Questions

What is an MSP stack?

An MSP stack (also called an MSP tech stack or MSP tool stack) is the full set of software platforms a managed service provider uses to deliver IT services – monitoring, ticketing, security, backup, documentation, and billing. A healthy stack multiplies technician capacity. A bloated one quietly eats your margins.

What tools should every MSP have in their stack?

Every MSP needs a PSA, an RMM, an endpoint security platform (EDR at minimum), a backup and disaster recovery solution, and a documentation system. These five layers cover the core of service delivery. Additional tools – security awareness training, SIEM, identity management – should be added based on client requirements and service tier, not vendor pressure.

How much should an MSP spend on their tech stack per endpoint?

The industry benchmark is around $24.50 per endpoint in tooling costs – but the broader picture is that the average MSP spends 29% of revenue on vendor tools. For a $2.5M MSP, that's roughly $734K per year. MSPs billing $150 per user per month have about $125 left to cover labor, overhead, and profit. Consistently exceeding $30 per endpoint is a signal that consolidation is needed.

What is the difference between PSA and RMM?

Your RMM (Remote Monitoring and Management) sits on the endpoint and handles monitoring, patching, remote access, and scripting. Your PSA (Professional Services Automation) handles the business side – ticketing, time tracking, SLA management, and invoicing. The RMM finds the problem; the PSA tracks the work and bills for fixing it. The integration between them is where efficiency gains or losses show up most clearly.

How do I audit my MSP stack?

Five steps: inventory every tool with its actual cost and renewal date, map each tool to a functional layer (PSA, RMM, security, backup, docs), score each tool for ROI using technician hours saved and ticket deflection, flag overlaps where two tools cover the same function, then assign a Cut/Keep/Consolidate decision to each one. Run this quarterly. The first audit takes the longest; subsequent runs are maintenance.

What is MSP tool sprawl and how do I fix it?

MSP tool sprawl is what happens when your stack grows by accumulated reaction instead of deliberate design – one trial here, one point solution there, until you're paying 12 vendors for capabilities that three good platforms could cover. The fix is the audit process above, applied consistently. The goal isn't fewer tools for its own sake; it's ensuring every dollar of tooling spend has a measurable return.

Can MSPs use tools with no per-seat license fees in their stack?

Yes, and a growing number of operators are doing exactly that. Platforms like OpenFrame offer RMM, ticketing, monitoring, and remote access with no per-seat fees – you pay for infrastructure, not headcount. The trade-off is typically a higher setup burden upfront and the need for internal expertise to configure and maintain the platform. For MSPs with technical staff and stable client counts, the long-term economics are often substantially better than per-seat licensing at scale.

Kristina Shkriabina

Kristina Shkriabina

Our flock's megaphone – once a correspondent for Ukraine's Public Broadcasting Company, now the one making sure Flamingo and OpenMSP sound exactly like what they are: direct, useful, and built for MSPs. She runs content and community, writes about stack decisions and marketing strategy.