Per User

Per Month

Data Discovery

Data Curation

Data Quality

Request Access



Per User

Per Month

All of Basic Plan

Intelligent Search

Text Narrations

Answer Recommendations

Search on Desktops and Mobile

Get Started





All of Essentials Plan

Actionable Insights

Audio Narrations

Interactive Stories


Custom Deployments


Contact Sales
Data duplication No No No
Deployment 100% Cloud 100% Cloud 100% Cloud or Hybrid
Data security and encryption
User management
Connect to any data store
Size of data in data store Limited to 2GB Limited to 2GB Can be Unlimited, per plan
Data Catalog
Data discovery
Data model curation
Data quality index
Business rules
Business metrics
# of workspaces 1 1 Unlimited
Intelligent Search
Natural language search
Contextual search suggestions
Ambiguity corrections
Multi-phased queries
Search prompts
Auto corrections
Answer Recommendations
Trust center
Search on any device
Actionable Insights
AI-driven insights
Automated model discovery
Automated model deployment
Business metrics & drivers
Why-loop analysis
Business headlines
Interactive Stories
Interactive Audio-visuals
Automated charts & visualizations
NLG text narrations
NLG audio narrations
Sharing & Collaboration
Self-service dashboards
Data Governance
Granular access control
Policy Definition
Policy Enforcement
User Group Management
Auditing & Reporting
Embedded analytics
API Access
Product Support
Service level Next business day Custom

Built for the cloud

No Servers No Hassle

No servers, No hassle

Agile and scalable.

Rapid Provisioning

Rapid provisioning

More power to decision makers.

Accelerated Analytics

Accelerated Analytics

End-to-end self-service.

Security & Governance

No data duplication

Data is queried in a read-only mode, and is not stored on our servers.

Secure connections

Secure data connections to data warehouses.

Encryption for data

All data queried or stored is encrypted in transit and at rest.


Manage team access with your SAML identity provider.

By design

Secure and private by design.

User provisioning

User provisioning and de-provisioning.

Audit logs

Detailed audit and activity logs.

Role based access

Control access to data, catalog and other features.