Inherent Persistence
Does it prevent attackers and users from bypassing its security functions?
If a perpetrator can find a way around the security controls of a particular technology, it is not serving its ultimate purpose.
An effective and efficient endpoint security platform should not have loopholes that could be exploited by attackers to bypass security.
It should also not cause performance issues that would hinder continuous usage.