Does the security solution effectuate the security functions it is intended to perform?
Two primary attack vectors are exploited to compromise endpoints:
Malicious executables (malware)
Vulnerability exploits
Effective endpoint security solutions (products or technologies), must prevent malware and exploits (known and unknown variants) from compromising endpoints and servers.