Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Common MSP Pricing Mistakes and How to Fix Them

N-able
05/08/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Stop pricing based on competitor rates or trying to be the cheapest option — this commoditizes your services and trains customers to focus only on price rather than the differentiated value and security outcomes you deliver
  • Price per user rather than per device, understand your fully burdened labor rate, and be honest about the time required to deliver your programs without artificially reducing estimates to meet customer budgets
  • Implement regular annual price increases to offset rising costs and maintain profitability — your customers are expecting them and good clients will understand when increases are properly communicated
  • Consider versioning your security suite annually (like car models) to promote standardization, position yourself as the expert, and remove the need to seek customer permission for technology changes
  • Bundle price increases with enhanced value through redesigned security programs, and don't fear strategic churn from customers who won't accept your pricing — it strengthens your overall book of business

Avoiding Competitive Pricing Traps

The session opens with a critical warning against pricing based on competitor rates or aiming to be the cheapest option in the market. This approach has led to widespread pricing commoditization in the MSP industry, where providers have inadvertently trained business owners to focus solely on the final price rather than the value delivered. By specializing in security and developing security-centric programs, MSPs can differentiate themselves through the benefits and outcomes they provide rather than competing on price alone. The emphasis is on education and communication — helping prospects understand why your approach is different and why that difference justifies premium pricing.

Per-User Pricing and Labor Cost Realities

The presentation advocates strongly for per-user pricing rather than per-device pricing, positioning users as the most expensive asset of any organization and the primary cause of security breaches. This pricing model aligns with the goal of keeping users safe, protected, productive, and working. Understanding your fully burdened labor rate — which includes hourly wages, payroll taxes, benefits, training, and all employment-related expenses — is essential for accurate pricing. MSPs must be honest about the actual time required to deliver their programs, resisting the temptation to underestimate labor hours to meet preconceived customer budgets, as this only erodes profitability over time.

Implementing Regular Price Increases

A significant portion of the discussion addresses what may be the biggest pricing mistake: failing to implement regular price increases. Many MSPs still avoid annual increases or haven't resumed them post-COVID, which naturally erodes profitability as business costs and inflation rise each year. The session provides practical strategies for introducing increases, including addressing them at executive business review meetings or, more effectively, bundling them with enhanced value through redesigned security programs. One particularly innovative approach shared involves versioning security suites like cars (e.g., "2023 Security Suite"), which promotes product standardization, positions the MSP as the expert, and removes the need to seek customer permission for technology changes.

Building Customer Acceptance Through Education

The final segment emphasizes that customers are actually expecting price increases — they've experienced them from every other vendor and are waiting for their MSP to implement them as well. The key is proper implementation through education and communication. By setting clear expectations during the sales process and maintaining regular executive business reviews, MSPs can build acceptance for annual pricing adjustments. The session acknowledges that some customers may resist, but suggests that strategic churn can actually strengthen your book of business by retaining only those clients who value your security-focused approach and expertise.

Chapters

0:00 - Common Pricing Mistakes to Avoid
4:38 - Per-User vs Per-Device Pricing
5:55 - Understanding Fully Burdened Labor Rates
6:59 - Honest Labor Time Estimates
8:08 - The Importance of Regular Price Increases
9:09 - How to Introduce Price Increases
10:38 - The Versioned Security Suite Approach
16:09 - Handling Customer Pushback and Churn

Key Quotes

0:30 "I think MSPs have done themselves a great disservice by always focusing on the price and what their competitors are charging for their programs."
1:00 "We haven't done as good of a job of educating and communicating how your MSP is different and how your approach is different and therefore the value that you provide and the experience that you provide is different and that is what goes into our price."
4:00 "A lot of MSPs are still very much scared to kind of have that security and risk conversation with their customers because they know that by implementing a layered approach to security, like we talked about last week, it's just going to end up costing their customer more each month."
8:28 "We need to set a cadence, set a precedent when it comes to our price increases, because your costs go up every year, right? Like whether it's your business costs or whether you've had to deal with general increases in inflation."
12:15 "By implementing this security bundle, it promotes naturally product standardization and it keeps every customer basically on the same program with the same feature sets, with the same tech stack."
14:55 "They really do take kind of the tell don't sell type of approach with their customers. You know, if they feel because they're the security experts that the threat landscape has changed, that some products that they had aren't as effective anymore or there's a new version or there's a new service that we need to include like MDR as an example, then they go and make their changes."
16:19 "Little secret. They've had their prices raised by everybody else. The fact that you haven't raised their prices yet, they're waiting for it now. They're not going to come to you and say, hey, you know, you should raise our prices."
17:08 "To me, churn is not a bad word if it means that it's going to allow you to build a better book of business."

Categories:
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Best Practices
  • Getting Started
  • Technical Deep Dive
  • MSP Pricing Strategy
  • Price Increase Implementation
  • Per-User Pricing Models
  • Security-Centric Program Development
  • Competitive Differentiation
  • Product Standardization
  • Customer Value Communication
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Common MSP Pricing Mistakes and How to Fix Them

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Satori Spring: Insights from Recent Research on the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/satori-spring-insights-from-recent-research-on-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version