During January and February 2017 we continuously evaluated 13 endpoint protection products using settings as provided by the vendor.[...] We focused on realistic test scenarios and challenged the products against real-world threats. Products had to demonstrate their capabilities using all components and protection layers.