As mentioned, this topic is diverse. As a non-expert, I'll offer my 2¢ about it.
I'm running Norton AV (N360 2014 version) simultaneously with MBAM Pro. I switched to Norton in December '12 after using 2 previous mainline AV's.
I like to evaluate an AV's performance after the 2nd year of installation/use on my PC's to see how it performed, if anything penetrated its shields, etc.
So far, Norton's been the best choice for me but as mentioned, it's one topic where there's a lot of diverse point of views about the best protective plan to use on one's PC.
I'll mention that, regarding MBAM Pro/Premium, there tends to be considerable mis-information about running the real-time product simultaneously with mainline AV products.
As quietman7 has mentioned in this thread and elsewhere at this forum, MBAM is designed to work in conjunction with the mainline AV products.
Occasionally, mostly elsewhere at particular AV forums, you'll read posts where it's stated that you must not run any 2 real-time products simultaneously since that will cause conflicts, thus increasing the chance for an infectious object to penetrate into the PC. This statement isn't substantiated by lab test data, nor AV user testimonials that I have found thus far in reading about this topic.
There are a lot of experts that recommend a dual-layer protection approach with a mainline AV product with an antimalware-specific product. That's the reason I've been running both products on my 2 PC's.
You'll be on the right track with quietman7's posts with this topic and elsewhere on the forum. He may not be Dick Tracy but it's A-1 advice .
I'd add the benefits of maintaining an overall backup plan in addition to the advice of product selection for malicious protection.
It's hard to beat the "peace of mind" benefit of having several full-HDD backups available in the event that malicious intrusions penetrate the AV and malware-protective products' front-line defense mechanisms.
I've recovered twice during the last several years from malicious intrusions by installing a cloned HDD (or one can restore the HDD from an Image file). I was running the PC normally within a few minutes after both malicious intrusions.
From what I've read about this topic the past 3 years, the best protective strategy is to utilize several methods, including safe PC habits and practices, keeping protective software, plug-in's, add-on's updated, things along those lines.
The last one's just my opinion, but backups are my priority for recovering from numerous undesirable situations, malicious infections, HDD failures, bad downloads or corrupt OS updates, and user mistakes.