Retool's plans scale for any organization—from startups to Fortune 500s.
Retool empowers you to quickly build internal tools with rich graphical user interfaces around any sort of datastore or API.
It generally takes an engineer around ten minutes to understand the concepts of Retool, and another hour for it to feel natural.
After building an app in Retool, it is automatically hosted by Retool. To get other people to use your app, invite them to join your Retool organization.
User mode is meant for the people who will be using your app — they get access to all the functionality you've built but can't edit the app's underlying queries and logic.
Editor mode is available on all plans. All users can toggle between editor and user mode on the Startup Plan, and more granular access controls are available on the Pro plan and above.
If you have more stringent data requirements, you can deploy Retool on-premises in your own VPC/VPN. The setup is via Docker and takes around 15 minutes to get running.
Except for a license check that happens every 6 hours, Retool doesn't require any external data connectivity. Retool offers a completely airgapped version that requires no network connectivity if you require HIPAA / PCI compliance.
Generally engineers are the ones building apps in Retool. But people who know SQL can pick up Retool pretty easily too. At this point, a good chunk of Retool users are non-technical.
Once you’ve built a useful app in Retool, you can use it yourself or launch it to other members of your organization in user mode. These are often non-technical stakeholders in customer support, marketing, operations, or on the executive team.
A user is anyone with their own login access to Retool. All users in your Retool account are billed at the same plan rate per month.
Retool comes with the kind of security, reliability, and controls that every internal tool deserves. Your customer data is never stored on our servers and we use end-to-end encryption to keep your data safe while it’s in transit. For more information, see our security documentation. If we don't answer your question there, let us know.