This document summarizes IBM's perspective on mobile security challenges facing enterprises and provides an overview of IBM's mobile security solutions. It introduces IBM's Identity & Access Mobile Security Maturity Model and provides examples of real-world mobile security implementations. The document demonstrates an example mobile security architecture and demo of an identity-aware mobile application that incorporates device registration, context-aware access controls, and application revocation capabilities provided by IBM Security Access Manager.