Although I was a fan of Zemana in the Olden Days (and Ida was very nice), this latest incarnation leaves a bit to be desired. Just a fairly easy test yielded:
1). Although an on-demand scan of a given file will detect the file, actually running that file will lead to infection This was doe using various ransomware samples)
2). Covert a vbs worm to a executable and ZAM in may case will detect them; leave them as vbs files and infection will occur. What can be seen here is that ZAM seems to be blind to malware that are not executable files. Stuff like malware occurring as Powershell, jScript, scr, etc will cause system infection.
3). Other nastier things also led to system infection, but why darken the day further?
All in all, it seems that Zemana has actually taken a step backward with 3.2.1.1 beta.
M