Hi, Damian
if you are asking about my opinion, in the my opinion, after what I had in paste, I think less "real time services" and more prevention is much better, there are so many antispyware and antivirus and other kind of anti bla bla...!!
I think I've played with malwares more than you, you know what kind of risks I've done, after doing all of them I found that really one "Real time scanner is enough"!! and we should change ourself behavior, not more real time protection tools.
one good antivirus tool and now usually most of them cover spywares too, a firewall is all the real time protection needed.
we protect our system from virus (else than security part) to prevent viruses impact on out system performance, so many real time protection is almost same virus behavior...
ok, now I try to show what I mean:
how a virus come to computer? from an external source.
how many external source a computer have? Internet, LAN, USB things, CD/DVD/Floppy/BlueRay/HDDVD
now if we try to get a protection for each one of those source, don't you think those protection tools would cause we see our computer has been lagged down?!
I think best security suite software configuration is nothing if user himself act risky.
I agree COMODO BoClean had nice features, but my question is "why Allowing virus to come near computer to protect ourself from them with nice programs such as COMODO BoClean?"
is not immunizing external sources enough? why so many protection inside computer?
1. Using a safe browser that DOES NOT support features that let viruses come.
2. decrease chance of virus to load by immunizing HOSTS
3. disabling "Autorun" feature.
4. move all network traffic to antivirus temp/proxy to scan them.
5. scan all new/unknown files using VirusTotal and then run all those programs that can run using Sandbox
6. use trusted sites as much as possible and ignore unknown sites.
7. block all unwanted network traffic using a safe firewall.
8. use so many on-demand scanner such as Different antispyware and different Live Antivirus discs.
with steps above, computer is very protected and safe, why so many more real-time protection?
in above configuration computer is in fastest configuration and also protected.