February 2026. $1 trillion in SaaS market cap vanishes across early-to-mid February. The $285 billion cybersecurity wipeout was triggered by Claude Cowork's legal automation launch on Feb 3 (the "SaaSpocalypse"), with a separate cybersecurity-specific selloff following Claude Code Security on Feb 20. And somewhere in the wreckage, a 15-year-old assumption quietly dies: that SaaS vendors can raise prices forever because their customers have nowhere else to go.

They do now.

The thesis is simple: vendor consolidation has hit a wall across the entire IT and security industry. But it hits hardest in managed services – where the economics of vendor lock-in are most acute, and where the transition to unified open-source infrastructure will start first.

The numbers that spooked the market

EventImpactDate
Claude Cowork launch (legal automation)$285B SaaS wipeout triggered, traders at Jefferies coin "SaaSpocalypse"Feb 3, 2026
SaaS sector-wide repricing~$1T market cap erased across early-to-mid February, forward P/E ratios compressed from ~35x to ~20x (Janus Henderson, Wedbush)Early-Mid Feb 2026
Monday.com guidance cutQ4 revenue +25% YoY but FY2026 guidance of $1.45–1.46B (18–19% growth) missed consensus, stock -17% after-hoursFeb 9, 2026
DocuSign 12-month decline~50% stock price decline despite ~8% revenue growth (valuation reset, not business model collapse)Feb 2025–2026
Wedbush "Software-mageddon" noteSaaS repricing analysis publishedFeb 13, 2026
Claude Code Security announcementCybersecurity-specific selloff: CrowdStrike -8% (Feb 20), fell ~20% over two days (Feb 20-23); Okta -9.2%, Palo Alto -6.7%Feb 20, 2026

These aren't companies that missed earnings. Monday.com is still growing at 25%. DocuSign is still growing at 8%. The market isn't punishing performance – it's repricing the assumption that SaaS revenue compounds forever.

Why? Because the buyers already moved. 75% of organizations are pursuing security vendor consolidation (Gartner, 2022). Median SaaS revenue growth rates have decelerated to their slowest in a decade (SaaS Capital, 2025). The stock correction didn't cause the behavior change – it caught up to it.

This consolidation wave is happening across the entire IT and security software market – a $500B+ sector spanning every organization that runs 8–20 separate vendor tools for infrastructure, endpoint management, identity, monitoring, and compliance. But it's most visible, and most urgent, in managed services, where vendor payout ratios leave almost no room for margin.

February 20th changed the thesis

When Anthropic announced Claude Code Security – an AI agent that autonomously handles vulnerability scanning, incident triage, and security policy enforcement – the market repriced the entire concept of software defensibility. This triggered a separate, cybersecurity-specific selloff (CrowdStrike -8%, Okta -9.2%, Palo Alto -6.7%), following the earlier February 3 "SaaSpocalypse" triggered by Claude Cowork's legal automation capabilities.

Wedbush had published their "Software-mageddon" analysis on Feb 13 – a week before the Claude Code Security announcement – flagging the broader SaaS repricing already underway. But cybersecurity was supposed to be the moat AI couldn't cross. Too complex. Too embedded. Too regulated. The Feb 20 announcement made the repricing empirical.

The signal is what matters: if cybersecurity isn't safe from AI agents, what software category is? That's the question now sitting in every investor model. And 35% of enterprises have replaced at least one SaaS tool with custom-built software, with AI accelerating the trend (Retool Build vs. Buy Report, 2026). The theoretical became empirical.

The second wave hits different

The first wave of SaaS disruption was simple apps – project management, note-taking, basic CRM. CRUD operations and a decent UI. Easy to replicate.

The second wave targets the hard stuff: the operational infrastructure that runs IT, security, and endpoint management for businesses. This wave moves slower because these products have real structural barriers:

BarrierWhy it mattersWhy incumbents love it
Technical depthRMM, SIEM, EDR need deep OS integration, real-time telemetry, protocol-level accessCan't be prompt-engineered away
MaturityProduction-grade IT infra takes years of edge-case hardeningCreates a multi-year head start
Integration gravityOne alert must trigger ticketing, notification, docs, and remediation across systemsForces customers into multi-product bundles
Data fragmentationIT/security ops generate massive telemetry across 8–20 vendor dashboardsWhoever owns the data layer owns the customer
Compliance overheadSOC 2, HIPAA BAAs take 12–18 months per toolRaises switching cost beyond software alone
Contract lock-inMulti-year auto-renewals, narrow cancellation windowsMakes churn structurally difficult

These six barriers are why Kaseya (25.9% market share) and ConnectWise have maintained pricing power for decades (Canalys Q4 2024). They're also exactly what makes this market ripe for a different kind of disruption – not AI-generated tools, but unified open-source infrastructure that's already been battle-tested.

These barriers apply everywhere vendor stacks fragment. The MSP market is the beachhead – where vendor dependency is most extreme and the economics most acute. But the model scales structurally to any organization running fragmented IT/security stacks: enterprises with distributed infrastructure, government agencies with compliance constraints, mid-market operations managing multi-tenant environments.

The MSP unit economics are broken – a microcosm of the entire industry

The managed services market ($500B+ globally) is the most acute case of vendor lock-in economics in IT. Why? Because MSPs buy the entire stack – RMM, SIEM, EDR, PSA, backup, monitoring, IAM, ticketing – all of it. Every other buyer (enterprises, mid-market, government agencies) runs some combination of these same tools, but MSPs run all of them at scale on behalf of their clients.

MSP unit economics show what happens when vendor dependency is maximized:

Here's what their P&L actually looks like:

MSP Economics (750-seat reference)Value
Annual revenue~$2.03M
Monthly recurring revenue$168.75K
Average seat price$225.00
Total cost per seat$137.75
Vendor payout as % of seat cost61.22%
Vendor payout margin (what MSP keeps)38.78%
Net margin~10–15%
Number of separate vendor tools8–20
Technician time lost to context-switching~25%
Number of MSP employees (750-seat operation)11
Total software OPEX overhead per employee$1,936/mo

Read that again: 61% of every dollar an MSP spends on its tool stack goes directly to vendor payouts. Net margins average 10–15% across the industry, with best-in-class MSPs reaching 18%+ (ConnectWise Service Leadership Index, MSP Success Profitability Report). And every single renewal cycle, those vendor costs go up while client budgets stay flat.

This is the extreme case. But any organization running 8–20 siloed vendor tools faces the same problem: the cost per tool keeps rising, the tools don't talk to each other, and the total stack cost becomes impossible to justify against alternatives.

Here's the per-category breakdown of what that $137.75/seat actually buys:

DepartmentCategoryAvg Cost/SeatWind-Down Phase
NOCRMM$3.00Gen 1
NOCNetwork Monitoring$1.25Gen 2
NOCPatch Management$0.75Gen 1
NOCRemote Access & Support$0.50 + $38.50/empGen 1
SOCEPP (Antivirus)$3.00Gen 3
SOCEDR$8.00Gen 3
SOCXDR$15.00Gen 1
SOCSIEM$10.00Gen 1
SOCEmail Security$3.00Gen 2
SOCMDR$7.50Gen 3
SOCIAM$4.00Gen 2
SOCSecure Remote Access$7.50Gen 1
SOCZTNA$10.00Gen 2
OpsPSA$825.00/empGen 1
OpsDocumentation & Passwords$20.00Gen 1
ITMDM$4.00Gen 1
ITCloud Backup$0.25Gen 2
ITBDR$7.50Gen 3
ITCollaboration Tools$10.00Never
ITVirtualization$10.00Never
ITCloud Services/SaaS$12.50Never

Note: Per-employee costs (PSA at $825/emp, Remote Access at $38.50/emp) represent operational expenditure (OPEX) allocated across the MSP's 11-person team. Per-seat costs represent cost of goods sold (COGS) scaling directly with managed endpoints. The $137.75/seat baseline normalizes both across the 750-seat reference deployment.

Each category with its own vendor, its own contract, its own dashboard, its own annual price increase. The MSP technician – already stretched across 11 people for a 750-seat operation – spends a quarter of their day just switching between them.

OpenFrame: unified data layer, not one more dashboard

OpenFrame doesn't build new tools. It doesn't AI-generate anything. It takes mature open-source projects – many with years of production deployment – and unifies them into a single stack with one API and a unified data layer built on Apache Pinot, Debezium, and Kafka — purpose-built for SIEM-grade telemetry aggregation and real-time cross-system correlation. Flamingo monetizes through per-seat SaaS licensing at $1–5 per endpoint for the seven Gen 1 modules, plus usage-based pricing for AI agent capabilities – roughly 60% below incumbent pricing, with optional managed hosting.

The defensibility lies not in the individual open-source tools but in the connection layers between them – the unified data model, the AI-native memory management across systems, and the integration logic that turns fourteen separate projects into a single operational surface. Flamingo's current engineering team of 10 is tripling to 30 with the seed round, with hires focused on platform integration, AI/ML, and MSP-specific workflows. Each integration project is owned by a dedicated engineer, with platform infrastructure, AI/ML, and QA shared across the team. Over 100 MSPs are testing the platform daily on our beta, with 40–50% expected to convert to commercial licensing as Gen 1 reaches general availability. OpenFrame uses point-in-time forked versions of all upstream projects, both to enforce Flamingo's own security standards and to insulate production deployments from upstream breaking changes. All forks are actively maintained by Flamingo's engineering team, with security patches applied within 48 hours of upstream CVE disclosure and bug fixes backported on a rolling basis.

Here's what that looks like category by category – the popular commercial vendors MSPs use today, the open-source project OpenFrame integrates instead, and the current status:

CategoryPopular MSP VendorsOpenFramePhaseStatus
RMMKaseya (VSA + Datto RMM), NinjaOneTacticalRMMGen 1✅ Live
Remote AccessConnectWise ScreenConnect, SplashtopMeshCentralGen 1✅ Live
SIEMBlumira, ConnectWise SIEMSelf-builtGen 1✅ Live
MDMMicrosoft Intune, KandjiFleetDMGen 1✅ Live
Patch ManagementNinjaOne, Kaseya VSAChocolatey + HomebrewGen 1✅ Live
PSAConnectWise PSA, Autotask (Kaseya)Self-builtGen 1🚧 In dev
DocumentationIT Glue (Kaseya), HuduSelf-builtGen 1🚧 In dev
IAM & ZTNAMicrosoft Entra ID, OktaAuthentik + OpenZiti + FleetDMGen 2⏭️ Planned
Network MonitoringAuvik, DomotzNetdataGen 2⏭️ Planned
Email SecurityINKY (Kaseya), Proofpoint EssentialsRspamdGen 2⏭️ Planned
Cloud BackupDatto SaaS Protection (Kaseya), VeeamResticGen 2⏭️ Planned
EDR + EPPHuntress, Bitdefender GravityZoneOSQuery + Windows Defender / Apple XProtect (free)Gen 3✅ Live
MDRHuntress, Sophos MDRSelf-built AI automation + TheHiveGen 3⏭️ Planned
BDRDatto BCDR (Kaseya), Axcient x360RecoverRestic + DRLM/ReaRGen 3⏭️ Planned
CollaborationMicrosoft Teams, SlackNeverStays vendor
VirtualizationVMware (Broadcom), Microsoft Hyper-VNeverStays vendor
CRMHubSpot, Kaseya BMSNeverStays vendor
Cloud ServicesMicrosoft 365 + Azure, AWSNeverStays vendor

Seven Gen 1 categories – five live, two nearing completion. Four Gen 2 categories planned. Three on the Gen 3 roadmap, one already live (EDR+EPP). Four categories deliberately left untouched – because the open-source alternatives aren't there, and pretending otherwise would be dishonest.

The unified data layer is the whole point. When RMM, SIEM, MDM, and ticketing share one database, a security alert automatically cross-references the device's patch status, compliance posture, ticket history, and documentation. No API integrations to maintain. No copying between dashboards. No hope-based workflows.

That's architecturally impossible with siloed vendors. It doesn't matter how many "integrations" they ship – the data was separated at birth.

The "self-built" components – SIEM, PSA, documentation – are self-built because they're AI-native by design. The PSA is fed by the desktop AI app, not forms. Knowledge management is AI-generated and AI-maintained. This is what makes them structurally different from incumbents and adds defensibility beyond the sum of the open-source components. The MDR detection pipeline combines Sigma-compatible anomaly detection rules with ML-generated insights about emerging issues. Mingo – Flamingo's technician-side AI agent – handles analyst-assisted triage in the initial release, with autonomous remediation capabilities rolling out post-Series A as the detection model matures on production data.

The phased vendor wind-down

OpenFrame's roadmap isn't "replace everything on day one." It's a phased TCO reduction that starts with the categories where open-source has the deepest maturity and the highest vendor margins:

PhaseTimelineWhat gets replacedCost/SeatVendor Payout %Hosting CostCumulative Reduction
BaselineTodayNothing$137.7561.22%$0.00
Gen 1Years 1–2RMM, Remote Access, SIEM, XDR, Secure Remote Access, MDM, Patching, PSA, Docs$77.0039.61%$12.13▲ 44%
Gen 2Years 3–4Network Mon, Email Sec, IAM, ZTNA, Cloud Backup$58.5033.47%$16.80▲ 58%
Gen 3Year 5+EPP, EDR, MDR, BDR$32.5023.57%$20.53▲ 76%

The margin story:

MetricBaselineGen 1Gen 2Gen 3
Vendor payout margin (what MSP keeps)38.78%60.39%66.53%76.43%
Total cost per seat$137.75$77.00$58.50$32.50
Vendor payout reduction0%44.10%57.53%76.41%

From 38.78% vendor payout margin to 76.43%. For a 750-seat MSP at ~$2.03M revenue, that's the difference between scraping by at 10–15% net margin and running a structurally profitable operation.

Revenue assumption: $225/seat held constant across all phases. Actual pricing power may increase as MSPs reinvest margin savings into service differentiation.

Note the hosting costs climbing from $0 to $20.53/seat. That's honest accounting – self-hosting isn't free. But $20.53 in hosting to replace $105.25 in vendor costs is a trade any CFO makes instantly — that's $84.72 in net savings per seat. And the phasing is conservative – Gen 1 alone drops vendor cost from $137.75 to $77.00/seat, a 44% reduction before Gen 2 even starts.

Migration costs and training overhead vary by deployment but are modeled separately in Flamingo's deployment planning – the TCO figures above reflect steady-state vendor spend reduction, not one-time transition costs. Flamingo's deployment model is designed for a 30-day side-by-side transition – MSPs run OpenFrame alongside their existing vendor stack, validate functionality, then wind down the incumbent. Flamingo offers free months during the transition period to eliminate dual-cost overlap. The five-year phasing in the table above represents the full roadmap across three integration generations, not the transition timeline for any single phase.

What OpenFrame deliberately won't touch: Collaboration tools ($10/seat – Microsoft 365/Google Workspace), virtualization ($10/seat), CRM, and cloud services ($12.50/seat). These stay vendor-purchased. The open-source alternatives haven't reached MSP-grade maturity, and the integration value doesn't justify the build. The $32.50/seat remaining in Gen 3 is a feature, not a bug – it's the honest boundary of the model.

The convergence

Three things happening at the same time:

SaaS pricing power is cracking. $1T in market cap repriced. Forward multiples compressed. 75% of buyers actively consolidating. The "we can raise prices 10% annually forever" model is meeting resistance for the first time.

AI is redrawing category lines. February 20th proved that even "complex" software categories aren't immune. If cybersecurity stocks can drop 8% on a single AI announcement, every vendor's "moat" narrative needs revision.

Open-source IT/security infrastructure matured. Not last year. Not next year. Right now. Projects like TacticalRMM, OSQuery, Authentik, FleetDM, MeshCentral, OpenZiti, Restic, DRLM/ReaR, Windows Defender, and Apple XProtect have years of production deployments across thousands of environments. The maturity gap that protected commercial vendors for the past decade closed while they were busy raising prices.

These three forces are hitting every organization running fragmented vendor stacks. But they hit hardest in managed services – where the vendor dependency is most extreme, the margin pressure is most acute, and the business case for unified open-source infrastructure is most obvious.

MSPs are the beachhead. The market is $500B+ globally, with 61% vendor payout ratios and 10–15% net margins on average (top quartile 18%+). MSPs have been waiting for an alternative that doesn't require ripping and replacing their entire stack overnight. The phased wind-down model gives them exactly that – start with Gen 1 where the maturity gap is zero, see the cost reduction, expand from there.

The thesis scales structurally to any organization running 8–20 separate tools for IT and security operations – enterprises with distributed infrastructure, mid-market operations, government agencies. The MSP case is the most acute, but the underlying economics are universal.

OpenFrame by Flamingo – open-source IT & Security OS for any organization trapped in vendor stack fragmentation.


Sources

MSP unit economics from Flamingo internal financial modeling across a 750-seat reference deployment. The 61.22% vendor payout figure represents vendor software cost as a percentage of total per-seat tool cost ($137.75). This sits slightly above the industry benchmark range of 40–60% (Kaseya 2025 MSP Benchmark Report, Datto State of the MSP Report) because it includes fully-loaded security categories (SIEM, EDR, MDR, ZTNA) that many benchmarks exclude. The figure is cross-validated against real MSP P&Ls in Flamingo's beta cohort of 100+ MSPs.

Michael Assraf

Michael Assraf

Contributing author to the OpenMSP Platform