Protocol 46 endeavors to reduce loss, improve client asset protection, and greatly enhance client’s survivability and success by delivering an affordable, simple, holistic cyber security solution, enabling customers to understand and mitigate cyber risk.
Protocol 46 strives to rank first among our competitors in customer satisfaction and to become the number one provider of reliable, comprehensive cyber security for medium and small-sized businesses.
Why We Do This
Protocol 46TM was formed in the aftermath of a cyber-attack that targeted a small business in our hometown. Our founder Eric Ebner, was asked by a friend who owned a logistics and transit company, to review some irregularities within the company network. Upon a look through the systems Eric knew instantly that the company had been a victim of a data breach. When Eric approached the owner to inform him of the breach, the owner responded with surprise. “Why us? We are a small business. I only have 11 employees. Why would anyone want to target us?” The company worked with big name clients and had manifests that showed in detail what companies were shipping and transporting, including moving sensitive articles such as prototypes and concepts for engineering firms. Eric’s friend didn’t understand the value of his data. Yes, they were just a small business, but the data they stored on their network was invaluable to the thief and the customers they serviced were the real targets. The thieves wanted the transportation company’s data as well as their client’s data. What the intruders had taken was worth more than just credit card numbers or bank accounts, while they took the data they also took that companies reputation, as each client had to be notified and the road to redemption was quite long. Following that incident, Eric assembled a team, whose members’ expertise in military intelligence and military cyber operations would build the proactive, protective military grade cyber security product with one mission to complete in mind – protecting American businesses, large, medium or small, their employees and customers, from cyber threats on their networks.
Chief Executive Officer
Scott served in the Army, Air Force, and Minnesota National Guard, retiring as Director of Intelligence and Security, Joint Force HQ–MN. He has been a small business owner and a large corporate executive, giving him both a broad and deep view of business needs for cybersecurity.
Chief Operations Officer
Matt’s Civilian and military career included positions in retail sales and management, franchise owner, training and development, military leadership positions from small unit to state headquarters level organizations culminating as the Director of Strategic Plans and Policy for the Minnesota National Guard where he helped to shape the cyber security training program for the Croatian Armed Forces.
Director of Special Operations
Clay provides the leadership and guidance for the organization’s business operations. He oversees the effectiveness of the organization by monitoring existing processes, creating strategies to improve productivity, and ensuring our existing and future services meet client needs. Additionally, he is responsible for management of inventory, facility layouts, and product distribution. Clay has had a long, distinguished military career as a US Army Infantry Officer, serving our nation for 28 years
Chief Technology Officer and Founder
Eric served with the Minnesota National Guard as a full-time intelligence analyst focused on impact of Cyber threats to Minnesota government and critical infrastructure. Eric created the proprietary Protocol 46 Platform. He provides vision and leadership on R&D initiatives and manages the daily operations of the our internal IT departments.