Malware cannot be stopped by one single solution due to 13 key steps that can be used for effective delivery.
If anyone is selling you a single cyber security solution, they're missing the boat and you'll have holes in your security plan.
Let me say this again, all next gen solutions will have weaknesses somewhere in these 13 areas.
All malware follows an attack sequence:
1) Conduct reconnaissance
2) Compromise endpoint
3) Establish a control channel
4) Pursue some kind of objectives
Of the above four stages, there are only two where you have a chance of breaking the killchain.
If you already have entrenched malware with an established control channel, it can be difficult to impossible to stop it. Just like any of the control infestations, sometimes you have to tear it down and rebuild.
Paying a ransomware (one example of an objective in the killchain) is not a guarantee that it's gone! It merely means you've made a payment and the current incident is hopefully over. For the record, if you have/had ransomeware you have been breached.
Most cyber security solutions today focus on the compromise endpoint phase. Depending upon what kind of solutions you have, they may address other portions of the first three steps of the attack sequence with varying degrees of effectiveness.
This article focused on the four steps in the killchain of the 13 things to know about malware.
It does not include other important areas of cyber security that have nothing to do with malware (as opposed to malicious intent) such as credential theft, credential harvesting or credential reuse.