RM Education Ltd

RM Easimaths

Combining successful pedagogical methodology with built-in diagnostic tools and meaningful reporting functionality, RM Easimaths offers teachers an effective online tool to teach core maths skills in a safe, fun and engaging online environment. Please refer to onboarding and offboarding section for exit plan details.


  • Content from Y1 to Y6 of the national curriculum
  • Content for P1 to P7 of the Curriculum for Excellence
  • Reports for teachers covering Progress, Usage and Problems
  • Unique management system to automatically progress pupils
  • Online software
  • All questions read to pupils
  • Pupils can earn certificates for progress
  • Pupil dashboard to see progress
  • End of session game for pupils
  • Import pupils from CSV file


  • Minimal teacher input to manage system, saving time
  • Content adapts to pupils' ability automatically
  • Pupils progress at best possible rate
  • Teachers can see pupil progress and issues at a glance
  • Language barriers reduced for ESL pupils and weak readers
  • 24/7 access on almost any device
  • Can be used at home and in school
  • Pupils can compete with peers whatever their ability
  • Easily import pupil data, usernames and passwords
  • Suitable for UK Primary schools


£110 to £640 per licence per year

Service documents


G-Cloud 11

Service ID

8 1 3 0 5 9 6 3 4 7 3 2 7 1 6


RM Education Ltd

RM Education Ltd

08450 700300


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
RM Unify
Cloud deployment model
Private cloud
Service constraints
System requirements
  • Internet connection
  • Latest Browsers, IE, Firefox, Chrome or Safari
  • Apple and Android tablets require a free app
  • Screen size greater than 7 inches

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond within 4 hours during working hours.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We have 1st, 2nd, 3rd and 4th line support, which is included in the subscription price.
No technical account managers or cloud support engineers are provided.
Support available to third parties

Onboarding and offboarding

Getting started
We provide free webinar training for customers as well as a comprehensive manual. Some schools occasionally ask for on-site training.
Service documentation
Documentation formats
End-of-contract data extraction
They can export their data via reports and a CSV file.
End-of-contract process
We send the customer a reminder at least 1 month before the end of the service to let them know it will end and how to renew.
There are no additional costs to decommission the service.
To comply with GDPR we delete data after 60 days from the site. We engage with customers to inform them what is happening every step of the way.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The tablet version requires a free App to be installed on the tablet. We support Android and iPad tablets.
Service interface
Customisation available
Description of customisation
Pupil levels can be set for each pupil by a teacher. Groups can be set up to manage reporting.


Independence of resources
We monitor the realtime performance of the service via internal and external APDEX tests to ensure that users experience is optimal. If the service is below threshold, we are able to adjust the infrastructure accordingly.


Service usage metrics
Metrics types
All pupil progress is available via the reports. The comprehensive reporting system allows teachers to see usage, progress and problems.
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Less than once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Via CSV export.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
No fixed SLA though we do aim for >99.5 % uptime
Approach to resilience
Available on request
Outage reporting
Internal monitoring, email alerts and a public Status dashboard

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
RM Easimaths uses a custom Roles based permissions system for management and support teams.
Access restriction testing frequency
At least once a year
Management access authentication
  • Username or password
  • Other
Description of management access authentication
Access is only permitted inside the RM Domain

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Security across RM is governed by the Group Security & Business Continuity Committee. All staff are required to abide by Group security policies which are available on an internal security portal. There is a Group security compliance function that oversees security management across the RM Group.
Information security policies and processes
RM has the following security policies:
RM Group Security Policy.
Acceptable Usage Policy and Security Guidelines ("AUP").
Backup Policy.
Data Classification and Handling.
Data Protection.
CCTV Policy & Guidelines.
Cryptographic Policy.
Incident Reporting Management & Forensic Readiness.
Legislative Compliance (Security) Policy.
Physical Access.
Protective Monitoring.

All staff are required to read and acknowledge the AUP on an annual basis, as well as having security clauses in their contracts.

Core functions, e.g. IT and HR, are subject to regular internal and external audit.
There is a network of Local Security Officers and the Group Security and Business Continuity Committee monitors compliance with polices.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All deliverables are logged and tracked in Change Control tickets with implementation steps, an approval workflow, priority and rollback information where required. Issues affecting the security of the platform are peer reviewed by the Operations team and CAB.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All public-facing IP addresses are subject to 3rd party vulnerability scanning on a quarterly basis. The results of these scans are reviewed by the development team and patches installed, the timescale of which will be governed by recorded priority.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Operational service monitoring is undertaken through quarterly vulnerability scanning from an independent CREST approved vendor. Each issue is then tracked and given an appropriate priority by the Operations Manager. High priority issues will be reported within hours and dealt with as soon as possible, ie hours or days. Medium or Low priority issues will be prioritised within weeks.
Incident management type
Supplier-defined controls
Incident management approach
All security incidents are reported on an internal logging system. The log records nature and impact of incident, as well as potential preventative measures. All reported incidents are reviewed by senior management and evaluated at either divisional or Group security forums. Major security incidents would be managed according to a defined major incident management process.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£110 to £640 per licence per year
Discount for educational organisations
Free trial available
Description of free trial
The free trial is available for 2 months, with full access to the service, including support and training.
Link to free trial

Service documents

Return to top ↑