Welcome to Protocol 46

At Protocol 46, we are dedicated to providing enterprise-class cyber security to everyday businesses at an affordable price.

We are a veteran owned and operated company with the majority of our board members and advisors having served in our Nation’s Armed Forces. At Protocol 46, we have over 150 years of cumulative experience in cyber security, software development, and intelligence.

We are a Cyber Security Testing, Assessment and Response Team (C-START) service company with the ultimate goal of protecting medium and small-sized American businesses by providing military grade cyber security solutions.

Veteran-owned Protocol 46 closes successful $1.1 million growth round with Twin Cities Angels for cybersecurity growth in the SMB market

St. Paul, MN - From the bunker of a former firearms warehouse, a group of military intelligence veterans provides cyber defense for businesses using their groundbreaking Defense in Depth cybersecurity solution. This week, they closed a $1.1 million round of financing.  Although details are not disclosed, Twin Cities Angels took the lion’s share investment in this $1.1 M Preferred round of financing and led the round.

Protocol 46 provides full service risk management and cybersecurity specifically for small and medium sized businesses with Defense in Depth, a plug-and-play military-grade cybersecurity solution for American small and medium sized businesses in this attractive but underserved $200 billion market. These businesses are in a tough spot,” said Scott Schue, CEO of Protocol 46. “They face the same risks of a breach and the same compliance requirements as large companies, but with far fewer tools and solutions available at an affordable cost.”

The combat veterans who founded Protocol 46 have been working in cyber intelligence in American defense for more than 15 years. They have experienced the changes in cyber defense firsthand. Threats come faster. Hostile actors are more sophisticated. American small and medium-sized businesses are their top target. Those businesses hit the sweet spot for cyber criminals: they hold the same high-value data as their larger enterprise counterparts, they are least likely to have adequate cybersecurity, and a breach is  likely to have the biggest negative ripple effect.

Defense in Depth by Protocol 46 implements the vision of cybersecurity experts who see cyber differently. “We see cybersecurity as a complete battlefield, not just a few points of vulnerability,” explained Eric Ebner, Chief Technology Officer for Protocol 46.  The Protocol 46 team applied their military cybersecurity, software development, and intelligence experience to integrate and augment best-in-class solutions (such as antivirus, anti-malware, anti-phishing and firewall) with proprietary technology within one simple platform. The resulting solution is a digital mesh of software, hardware, and secure communications that allow the Protocol 46 SOC to provide 24/7/365 monitoring and threat detection.

“Working with Twin Cities Angels has taught us a great deal about the process of growing a business beyond the start-up stage,” said Mr. Schue. “The process of developing a relationship with an investor group has been a valuable experience. Twin Cities Angels’ investment in Protocol 46 enables us to reach a much broader audience in the SMB market, and we look forward to their continued partnership and guidance.”

“We’re excited to be working with the outstanding people at Protocol 46,” said John Alexander, founder and Chairman of TCA. “This is a great investment for our group, and we are looking forward to Protocol 46’s rapid expansion to serve the needs of small and medium businesses.”

About Twin Cities Angels: www.TCAngels.com

Twin Cities Angels is a formal organization for entrepreneurially-minded member angel-investors. TCA members have a mutual interest in having a high degree of personal involvement and interaction in angel investing. All members are accredited investors with significant industry or functional expertise to contribute to the group. TCA is principally interested (but not exclusively) in relatively early-stage companies where the organization’s members can lead or participate in the formative stages of a successful business. Based on their individual and collective expertise, TCA members are also committed to the organization’s mission of mentoring new companies by sharing their successful work experience and proven business judgment. TCA’s investment and market focus is based on the members’ professional expertise, including but not limited to medical technology (devices, diagnostics, pharmaceuticals, biotech, veterinary medicine) and information technology (software, hardware, and IT services). We invest in the upper Midwest 5-state area - within driving distance of the Twin Cities.

TCA seeks deal flow in the greater Twin Cities Area of Minneapolis/St. Paul, the state of Minnesota and within a reasonable distance of the Twin Cities in Wisconsin, Iowa, and the Dakotas. Members are educated in desirable investment skills: how to perform due diligence, deal flow creation, legal aspects of investing, term sheet key terms, the venture industry, technologies and other areas of specific interest to angel investors. The membership-lead organization convenes regularly to meet with pre-screened companies regarding potential investments.

More information about the Twin Cities Angels is available at www.TCAngels.com or

www.TwinCitiesAngels.com .

Who needs Cyber Security?

Financial Services

PII and bank account information is stored in large amounts at financial institutions. This information is of high value on the black market as it provides identification information and potential direct access to bank accounts.

Legal Services

These businesses also have large amounts of PII as well as confidential client information stored on their networks. Additionally these businesses already understand the risk that they are facing in the event a breach should occur.

HIPAA Compliant Providers

Clinics and hospitals are required by law to safeguard all HIPAA data. Many have transitioned to a cloud-based storage system in an attempt to secure their data. However, they have not looked at their individual networks and how best to secure their access to this cloud


Data stored by education organizations, both public and private, encompass some of the most highly sought after data on the dark web.  PII data for minors is considered the most valuable information due to the fact that if the information is stolen and utilized, the victim will not realize their identity was stolen until years later.


Insurance providers store a combination of both HIPAA and financial data. This makes them a prime target for an attack from cybercriminals.

Cyber security solutions for medium and small-sized businesses

Threat Info

Cyber-attacks against small and medium businesses occur across the United States every day.  These attacks are often rehearsals and capability tests that act as precursors to attempted incursions into a multi-national network.

Secure Your Network

Protocol 46™ is the premier military-grade cyber security provider for American businesses with data at risk for cyber theft. We provide clients with products that ensure in-depth protection from cyber security threats.

Up To Date Reporting

Our system provides real time cyber security issue reporting.  Knowing what is at risk allows your organization to quickly remediate the issues before they become a hacker's breach point. Our system stands out among the rest, as it provides real time cyber security issues reporting.

Loading posts...
Sort Gallery
Enter your email here