logo
Flamingo launches OpenMSP to help MSPs cut software costs

Flamingo launches OpenMSP to help MSPs cut software costs

Techday NZ03-07-2025
Flamingo has launched OpenMSP, a platform aimed at helping Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) increase profitability by adopting open-source tools and leveraging AI-powered analysis.
The MSP and MSSP sector, currently valued at $83.76 billion, faces significant challenges due to the high cost of commercial software and technician salaries. Industry estimates suggest that commercial software licensing absorbs between 20-35% of MSP revenue, with technician wages accounting for an additional 20-30%. This cost structure places many providers in a difficult position as they try to balance business growth and operating margins.
OpenMSP has been designed to address these issues by providing a systematic approach to reducing costs and improving margins. Developed by Flamingo, the open-source platform features an AI Margin Increase Report generator, which analyses an MSP's current software usage and produces a tailored report outlining current licensing expenditures, projected savings from replacing commercial software with open-source alternatives, and detailed implementation guidance.
The platform also includes a vendor mapping directory cataloguing 155 commercial vendors in four primary categories: Network Operations Centre (NOC), Security Operations Centre (SOC), IT operations, and business operations. For each commercial solution, OpenMSP identifies potential open-source equivalents, offering viable alternatives for 63% of the catalogued platforms. Examples of these mappings include commercial vendors such as ConnectWise, Datto, and Kaseya alongside open-source counterparts like TacticalRMM, Wazuh, and Odoo.
The adoption of open-source tools has traditionally been hindered by concerns around support, deployment complexity, and system integration. However, industry stakeholders note that these barriers are diminishing as open-source solutions mature. "Over the past 15 years, I've closely followed the evolution of open-source technology in the IT and security space. What started as basic tooling has now matured to the point where many open-source solutions rival, and often outperform, commercial products. While challenges around support, deployment, and orchestration remain, they're becoming significantly easier to manage," said Michael Assraf, Chief Executive Officer and Founder of Flamingo. "At my previous startup, I witnessed Managed Service Providers (MSPs) increasingly adopting open-source tools in isolated cases. OpenMSP was created to take that trend further - offering structured support and a unified path forward for MSPs ready to embrace open source at scale."
According to Stephen Garriques, Chief Executive Officer of SecureTokens, the platform has already delivered tangible benefits: "OpenMSP gave us a data-backed roadmap to restructure our SOC and NOC tooling using open-source platforms like TacticalRMM and Wazuh. We cut licensing costs by 27%, eliminated vendor lock-in, and gained tighter integration across our stack. The AI report made it easy to justify the shift internally and execute with confidence."
Key features of OpenMSP include side-by-side comparisons of leading commercial platforms and their open-source alternatives, allowing MSPs to make informed decisions regarding their technology stack and avoid vendor lock-in. Community support is another focus, with the platform offering access to a peer-driven user network, best-practice playbooks, and guidance for safe adoption and operationalisation of open-source tooling.
The platform is offered without cost, with MSPs able to access both the AI-powered margin analysis tool and the complete vendor directory. The platform aims to empower providers to take control of their cost structure while maintaining, or even enhancing, the capabilities required for their service operations.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

WebPros acquires Comet Backup to boost global data protection
WebPros acquires Comet Backup to boost global data protection

Techday NZ

time6 days ago

  • Techday NZ

WebPros acquires Comet Backup to boost global data protection

WebPros has acquired Christchurch-based data backup and storage solutions provider Comet Backup, expanding its global portfolio of web hosting and automation tools. WebPros, whose suite of products includes cPanel, Plesk, and WHMCS, operates in 227 countries and supports more than 60 million domains. The acquisition enables the company to broaden its data protection offerings to businesses worldwide. Company history Comet Backup was established in Christchurch nearly a decade ago. Since its founding, the company has provided data backup software focused on solutions for Managed Service Providers (MSPs) and IT teams. Its technology enables organisations to safeguard critical data, supporting everything from daily data backups to disaster recovery scenarios. In recent years, the importance of secure and reliable data protection has grown, with increasing risks related to cyber threats and data loss affecting businesses globally. The acquisition allows WebPros to strengthen its capacity to meet these security demands, aiming to serve an expanded, international customer base. "We are thrilled to welcome Comet Backup into the WebPros family. This is an important extension of our web enablement ecosystem, helping businesses address their backup and storage needs with greater efficiency and reliability," said Christian Koch, CEO of WebPros. Josh Flores, General Manager of Comet Backup, commented on the alignment between the two companies, saying, "It was clear to us from the outset that WebPros' leading global web enablement ecosystem is the perfect permanent home to take our business to the next level. The acquisition process itself gave both my team and me full confidence that the WebPros group is an optimal cultural fit for us. Our customers can expect the same great service, now with enhanced support and innovative new features as we continue to invest in the product." Reaction from the sector The deal has been welcomed by New Zealand's technology community. Liz Foxwell-Canning, CEO of Canterbury Tech, said, "Comet Backup's success is a brilliant example of the kind of world-class talent and innovation we have right here in Ōtautahi Christchurch. It's proof that you don't need to be in Silicon Valley to build and scale globally competitive software – South Island smarts can and do go the distance." Josh Flores also reflected on the company's progress, noting, "Our growth has been driven by a focus on delivering real value to our customers." Peter Thomas, the founder of Comet Backup, stated, "Joining WebPros will allow us to help even more companies protect their data and continue innovating on a global scale." Future direction Comet Backup will now be integrated into the broader WebPros platform, with the aim of supporting further growth and product development. The company will continue to focus on secure, scalable backup and storage for clients, protecting business data and supporting continuity in a digital world. The move is expected to provide Comet Backup with access to additional resources and networks, contributing to the reach and reliability of its data protection solutions within the global marketplace.

Golden dMSA flaw in Windows Server 2025 exposes Active Directory
Golden dMSA flaw in Windows Server 2025 exposes Active Directory

Techday NZ

time16-07-2025

  • Techday NZ

Golden dMSA flaw in Windows Server 2025 exposes Active Directory

Security researchers have identified a critical flaw in delegated Managed Service Accounts (dMSA) within Windows Server 2025 that could allow attackers to maintain persistent and widespread access across Active Directory environments. Flaw found in dMSA The vulnerability, uncovered by Semperis security researcher Adi Malyanker, has been termed the Golden dMSA attack. It takes advantage of a design issue in dMSAs, a security feature first introduced in Windows Server 2025, which can be misused by bad actors to gain ongoing access and elevate privileges across domains after compromising a forest-level account. Malyanker developed a tool named GoldenDMSA to demonstrate and analyse the technique, enabling security practitioners to examine in detail how the attack could be executed in operational networks. The research shows that the attack leverages a predictable element within the ManagedPasswordId structure of dMSAs. This identifier includes time-based components that, according to Semperis, present only 1,024 possible combinations. This low number of possibilities makes brute-force attacks on service account passwords computationally straightforward, potentially enabling a threat actor not only to persist in an Active Directory environment but also to move laterally across domains. "Golden dMSA exposes a critical design flaw that could let attackers generate service account passwords and persist undetected in Active Directory environments. I built a tool that helps defenders and researchers better understand the mechanism of the attack. Organisations should proactively assess their systems to stay ahead of this emerging threat," said Malyanker. Risk assessment and implications Semperis has rated the risk associated with the Golden dMSA technique as moderate. However, the researchers warn that in cases where an attacker achieves initial forest-level compromise, the method could make it possible to completely take over dMSA or Group Managed Service Account (gMSA) environments. Successful exploitation would allow attackers to maintain control without detection for extended periods, posing a severe threat to corporate and governmental IT infrastructure. The potential for widespread, persistent access stems from the architectural flaw in how dMSA passwords are generated and managed. By exploiting the weak cryptographic and structural protections, attackers could automate the generation of valid account credentials for managed service accounts, undermining protections intended to secure critical identity services. Recent related work The Golden dMSA research builds on previous work by Semperis in the field of identity threat detection. The group has reported on other vulnerabilities, such as nOauth, which affects Microsoft's Entra ID and may permit full account takeover in software-as-a-service applications. Semperis has also implemented detection features in its Directory Services Protector platform to defend against BadSuccessor, another high-impact privilege escalation technique that targets a recently introduced functionality in Windows Server 2025. This comes in addition to the Silver SAML vulnerability discovered by the team, a new variant related to Golden SAML attacks from the SolarWinds incident, which can bypass conventional security measures in Entra ID-integrated applications. Recommendations and industry impact The research underscores the need for organisations using Windows Server 2025 and managed service accounts to carry out active risk assessments and update their security controls. Attackers exploiting weaknesses in dMSA structures could not only remain undetected but also have unrestricted access to valuable resources across a company's entire digital estate. Industry observers and IT departments are expected to analyse the implications of the flaw, explore mitigation options, and consider how tools such as GoldenDMSA can be used by defenders to better understand and counteract these attack vectors. The ability to simulate attacks is viewed as a vital capability for defenders and researchers, supporting a more robust defensive posture against evolving identity-based threats.

RedShield launches Third Horizon to combat rising DDoS threats
RedShield launches Third Horizon to combat rising DDoS threats

Techday NZ

time16-07-2025

  • Techday NZ

RedShield launches Third Horizon to combat rising DDoS threats

RedShield has launched a new cybersecurity feature named 'Third Horizon' to provide additional protection against Distributed Denial-of-Service (DDoS) and automated bot attacks. New defence mechanisms The technology aims to make DDoS attacks more difficult by disrupting attack methods and forcing attackers to adapt in ways that typical automated or artificial intelligence-driven tools are unable to manage effectively. This approach seeks to put obstacles in place that increase the effort and cost required for cybercriminals attempting to undermine web applications. Fabian Partigliani, Chief Executive Officer at RedShield, said: "Much of the security industry remains focused on traffic profiling via AI-driven anomaly detection. However, in the last three years automated, bot-driven threats have become both greater in scale and frequency and more sophisticated. "As a result, traditional anomaly detection alone is no longer enough as a defence. In response to the escalation of DDoS and automated bot attacks, RedShield is introducing the 'Third Horizon' as the next evolution of DDoS and bot protection." Barrier to automated threats The Third Horizon feature works by challenging suspicious users seeking access to an application. When RedShield's systems identify unusual or potentially malicious behaviour, a user must supply a valid email address and then verify their identity using a code sent to that email. This can occur even if the individual does not have a pre-existing account, serving as an additional barrier that adds complexity for attackers using automated systems. Partigliani explained: "Third Horizon adds a layer of complexity that bad actors hate because it costs them more time, resources, and money. There are no simple technologies available to let them create enormous volumes of fake user accounts and then retrieve and enter verification for each one. An attacker will typically go and find an easier target." Three-layer approach RedShield's service operates by employing a three-tiered architecture for threat defence. The first layer, referred to as the First Horizon, uses traffic profiling to block high-volume attacks and evidently malicious traffic. RedShield achieves this through continuous volumetric protection provided via the AWS cloud platform. The Second Horizon focuses on sophisticated bot detection, targeting malicious bots attempting to appear as legitimate users. This level is described as an ongoing contest between defenders and attackers, with the technology seeking to increase the cost for would-be intruders. The newly launched Third Horizon provides an identity and intent challenge, requiring suspicious users to confirm an email address before accessing a site or application. This step particularly aims to counter mass automation since automated bots typically struggle to answer such requests at scale, thereby increasing the difficulty and expense faced by those behind DDoS and bot attacks. Growing threat landscape Recent findings underscore the scale of the challenge facing organisations. The Imperva Bad Bot Report indicates that automated bots accounted for nearly half of all internet traffic in 2024, and nearly a third was attributed to malicious bots. The frequency and size of DDoS attacks also grew sharply, with attacks exceeding 1 terabit per second increasing 1800% globally from the third to the fourth quarter of last year. Attackers continue to use bots for credential theft, data scraping, and overloading key business functions, including login and checkout services, exposing businesses in New Zealand and worldwide to operational and reputational risks. RedShield is extending its layered approach by offering the Third Horizon as an optional add-on service for customers requiring heightened protection. The company relies on the global infrastructure of AWS alongside its proprietary controls, which it describes as aimed at enabling continued application availability for legitimate users while deterring malicious activity. The new Third Horizon service will become available to RedShield customers for critical applications in the coming weeks, providing an additional tool in the evolving array of cyber defences.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store