We are accountable for results and provide clarity and assurance of procedures, processes, and controls to improve the security of our Clients. We deliver meaningful outcomes to those we serve and use resources wisely. We embrace our client trust obligation to be independent and transparent. We are collaborative in approach and seek constructive and innovative solutions.
What We Do
We focus on medium and small-sized businesses (less than 500 employees) and bring more than 100 years of cumulative experience of pertinent military and public sector experience identifying and neutralizing risk. At Protocol 46, we partner with American businesses and provide them with affordable and innovative cyber security solutions. We offer assessments to identify security vulnerabilities on your organization’s computer network or in a product you manufacture. Walk-through inspections of your facilities for identifying physical security risks are also available. In addition to assessments, Protocol 46 provides a range of products to provide complete and comprehensive cyber security protection.
Protocol 46 endeavors to reduce loss, improve client asset protection, and greatly enhance client’s survivability and success by delivering an affordable, simple, holistic cyber security solution, enabling customers to understand and mitigate cyber risk.
Protocol 46 strives to rank first among our competitors in customer satisfaction and to become the number one provider of reliable, comprehensive cyber security for medium and small-sized businesses.
Scott Schue, Chief Executive Officer
Chief Executive Officer
Scott provides overall leadership of the organization and creates, communicates, and implements the vision, mission, values, and direction of Protocol 46. Scott has the principal responsibility of setting strategy, creating the corporate culture, and leading team building strategies. Scott was President and Owner of S&Y Global Enterprise; a partner and Director of Sales for Breakwater Systems–an IT solutions company; and an executive with Target Corporation for 14 years within the Property Management pyramid in which he oversaw areas of Assets Protection, Facility Management, Project Management, and Information Technology & Asset Management. He proudly and significantly served our nation for 23 years in the US Army, US Air Force, and the Minnesota National Guard, completing 20 years of active duty service culminating his professional intelligence career as the Director of Intelligence and Security, Joint Force HQ–MN
Eric Ebner, Chief Technology Officer and Founder
Chief Technology Officer and Founder
Eric provides vision and leadership on all Technology concerns while developing and implementing R&D initiatives that align with the mission of Protocol 46. Additionally, Eric manages the day-to-day operations of the R&D, Client Support, and Protocol 46 internal IT Services departments. His diverse team consists of Cyber Security Technicians, Hardware and Software Developers, Systems Engineers, Security Engineers, Electrical Engineers, Information Security Analysts to name a few.
He owned and operated several IT businesses and has a diverse technological background in information security and intelligence operations spanning over 20 years. He comes to Protocol 46 from a company that performs audits of the cyber and physical security of the electrical power grid. Prior to this, Eric was a full-time member of the Minnesota National Guard where he worked as an intelligence analyst with a focus on the potential impact of Cyber threats to Minnesota government and critical infrastructure.
Matt Vatter, Chief Operations Officer
Chief Operations Officer
Matt’s Civilian and military career included positions in retail sales and management, franchise owner, training and development, military leadership positions from small unit to state headquarters level organizations culminating as the Director of Strategic Plans and Policy for the Minnesota National Guard where he helped to shape the cyber security training program for the Croatian Armed Forces.
Clay Wallace, Chief Operating Officer
Director of Special Operations
Clay provides the leadership and guidance for the organization’s business operations. He oversees the effectiveness of the organization by monitoring existing processes, creating strategies to improve productivity, and ensuring our existing and future services meet client needs. Additionally, he is responsible for management of inventory, facility layouts, and product distribution. Clay has had a long, distinguished military career as a US Army Infantry Officer, serving our nation for 28 years
Barry L. Schalkle, Chief Financial Officer
Barry L. Schalkle, JD, CPA
Director of Strategic Partnerships
Barry provides the leadership and guidance for the organization’s financial operations. He is accountable for the administrative, financial, and risk management operations of the company, to include the development of a financial and operational strategy and the ongoing development and monitoring of control systems designed to preserve company assets and report accurate financial results. Barry earned his Juris Doctorate (JD) from the University of North Dakota, and was awarded his CPA designation in January 1989 (inactive) and also served our nation as a US Army Criminal Investigator.
Brad Schmitz, Vice President of Sales
Vice President of Sales
Brad specializes in sales and has led sales teams for more than 30 years. He adds sales expertise, team-building skills, and contacts to our developing sales team at Protocol 46. Brad also served for the United States Army and Air National Guard.
Jane Tyler, Senior Security Systems Engineer
Senior Security Systems Engineer
Jane has many years of experience in network engineering, including both hardware and software. She excels at communicating with all levels of users and management. Her belief is that networks exist to support the employees that are doing the work of the organization. She cuts through overly complicated or troubled networks to produce well designed, east to troubleshoot, efficient and importantly, secure environments.
At Protocol 46 we may not have invented cyber security, but we did create a revolutionary system of cyber protection from top to bottom. To understand the foundation of Protocol 46 is to know what our company is passionate about and why. Colonel Scott Schue, as the Director of Intelligence and Security for the Minnesota National Guard was looking for the best Cyber Intel Analyst (CIA). Several people said the best was Eric Ebner, who Colonel Schue sought out and hired. Eric had honed his skills and learned the tell-tale signs of Cyber Warfare and the defenses that had to be in place to prevent vulnerabilities from being exploited. With this extensive knowledge Eric was also hired in civilian capacity to help secure the national power grid. While working there he furthered his knowledge assessing and mapping vulnerability of electrical and power grids against cyber-attacks. While Eric was excelling in the day to day tasks he had a drive to do more, wanting his work to have the greater purpose in helping more people. Eric envisioned a system that would defend and exterminate threats on a large level. About that time, Eric was asked by a friend, who owned a Minnesota based logistics and transit company, to check about irregularities within the company network. The company worked with big name clients and had manifests that showed in detail what companies were shipping and transporting, including moving sensitive articles such as prototypes and concepts for engineering firms.
Upon a look through the systems Eric knew instantly that the company had been a victim of a data breach. When Eric approached the owner to inform him of the breach, the owner responded with surprise. “Why us? We are a small business. I only have 11 employees. Why would anyone want to target us?” Eric’s friend didn’t understand the value of his data. Yes, they were just a small business, but the data they stored on their network was invaluable to the thief and the customers they serviced were the real targets. The thieves wanted the transportation company’s data as well as their client’s data. What the intruders had taken was worth more than just credit card numbers or bank accounts, while they took the data they also took that companies reputation, as each client had to be notified and the road to redemption was quite long. Luckily Eric had caught the intrusion quickly otherwise things may have not gone so well. With that Eric assembled a team, led by Colonel Schue, whose members’ expertise and a wide range of backgrounds would build the proactive, protective military grade cyber security product with one passion in mind – protecting American businesses, large, medium or small, their employees and customers, from cyber threats on their networks.