Welcome to Protocol 46

Our Principles

We are accountable for results and provide clarity and assurance of procedures, processes, and controls to improve the security of our Clients. We deliver meaningful outcomes to those we serve and use resources wisely. We embrace our client trust obligation to be independent and transparent. We are collaborative in approach and seek constructive and innovative solutions.

What We Do

We focus on medium and small-sized businesses (less than 500 employees) and bring more than 100 years’ cumulative experience of pertinent military and public sector experience identifying and neutralizing risk. At Protocol 46™, we partner with American businesses and provide them with affordable and innovative cyber security solutions. We offer assessments to identify security vulnerabilities on your organization’s computer network or in a product you manufacture. Walk-through inspections of your facilities for identifying physical security risks are also available. In addition to assessments, Protocol 46 ™ provides a range of products to provide complete and comprehensive cyber security protection.

Our Vision

To rank first among our competitors in customer satisfaction and to become the number one provider of reliable, comprehensive cyber security for medium and small-sized businesses.

Protocol 46

Our Mission

Protocol 46™ endeavors to reduce loss, improve client asset protection, and greatly enhance client’s survivability and success by delivering an affordable, simple, holistic cyber security solution, enabling customers to understand and mitigate cyber risk.

Our Team

  • Scott Schue

    Scott Schue, CEO

Scott Schue

Chief Executive Officer

Mr. Schue provides overall leadership of the entire organization and creates, communicates, and implements the vision, mission, values and overall direction of Protocol 46™.  Scott has the principle responsibility of setting strategy, creating the corporate culture, team building & capital allocation.

He was President/Owner of S&Y Global Enterprise, a Partner and Director of Sales for Breakwater Systems – an IT solutions company, an executive with Target Corporation for 14 years within the Property Management pyramid serving in a number of roles including overseeing areas of Assets Protection, Facility Management, Project Management, and Information Technology & Asset Management, and significantly, served our nation for 23 years in the US Army, US Air Force, and the Minnesota National Guard completing 20 years of active duty service culminating his professional Intelligence career as the Director of Intelligence and Security, Joint Force HQ – MN.

  • null

    Clay Wallace, Chief Operating Officer

Clay Wallace

Chief Operating Officer

Mr. Wallace provides the overall leadership and guidance for the organization’s business operations.  He oversees the effectiveness of the organization by monitoring existing processes, creating strategies to improve productivity and ensuring our existing and future services meet the client needs.  Additionally, he is responsible for overall management of inventory, facility layouts and product distribution.

He has owned or been a partner in several businesses and managed operations for some notable local and national companies.  He has had a long and distinguished military career as a US Army Infantry Officer with 28 years serving our nation.


  • Barry L. Schalkle, JD, CPA

    Barry L. Schalkle, JD, CPA

Barry L. Schalkle, JD, CPA

Chief Financial Officer

Mr. Schalkle provides the overall leadership and guidance for the organization’s financial operations and is accountable for the administrative, financial, and risk management operations of the company, to include the development of a financial and operational strategy, metrics tied to that strategy, and the ongoing development and monitoring of control systems designed to preserve company assets and report accurate financial results.

Mr. Schalkle earned his JD (Juris Doctorate) from the University of North Dakota, and was awarded his C.P.A. designation in January 1989 (Inactive).  He has owned or been a partner in several successful businesses.  He served our nation as a US Army Criminal Investigator.

  • Eric Ebner

    Eric Ebner, Chief Technology Officer and Founder

Eric Ebner

Chief Technology Officer and Founder

Mr. Ebner provides vision and leadership on all Technology concerns while developing and implementing R&D initiatives that align with the mission of Protocol 46™.  Additionally, Mr. Ebner manages the day-to-day operations of the R&D, Client Support, and Protocol 46™ internal IT Services  departments.  His diverse team consists of Cyber Security Technicians, Hardware and Software Developers, Systems Engineers, Security Engineers, Electrical Engineers, Information Security Analysts to name a few.

He owned and operated several IT businesses and has a diverse technological background in information security and intelligence operations spanning over 20 years.  He comes to Protocol 46™ from a company that performs audits of the cyber and physical security of the electrical power grid.  Prior to this, Mr. Ebner was a full-time member of the Minnesota National Guard where he worked as an intelligence analyst with a focus on the potential impact of Cyber threats to Minnesota government and critical infrastructure.

Our History

At Protocol 46™ we may not have invented cyber security, but we did create a revolutionary system of cyber protection from top to bottom. To understand the foundation of Protocol 46™ is to know what our company is passionate about and why. Colonel Scott Schue, as the Director of Intelligence and Security for the Minnesota National Guard was looking for the best Cyber Intel Analyst (CIA). Several people said the best was Eric Ebner, who Colonel Schue sought out and hired. Eric had honed his skills and learned the tell-tale signs of Cyber Warfare and the defenses that had to be in place to prevent vulnerabilities from being exploited. With this extensive knowledge Eric was also hired in civilian capacity to help secure the national power grid. While working there he furthered his knowledge assessing and mapping vulnerability of electrical and power grids against cyber-attacks. While Eric was excelling in the day to day tasks he had a drive to do more, wanting his work to have the greater purpose in helping more people. Eric envisioned a system that would defend and exterminate threats on a large level. About that time, Eric was asked by a friend, who owned a Minnesota based logistics and transit company, to check about irregularities within the company network. The company worked with big name clients and had manifests that showed in detail what companies were shipping and transporting, including moving sensitive articles such as prototypes and concepts for engineering firms. Upon a look through the systems Eric knew instantly that the company had been a victim of a data breach. When Eric approached the owner to inform him of the breach, the owner responded with surprise. “Why us? We are a small business. I only have 11 employees. Why would anyone want to target us?” Eric’s friend didn’t understand the value of his data. Yes, they were just a small business, but the data they stored on their network was invaluable to the thief and the customers they serviced were the real targets.  The thieves wanted the transportation company’s data as well as their client’s data. What the intruders had taken was worth more than just credit card numbers or bank accounts, while they took the data they also took that companies reputation, as each client had to be notified and the road to redemption was quite long. Luckily Eric had caught the intrusion quickly otherwise things may have not gone so well. With that Eric assembled a team, led by Colonel Schue, whose members’ expertise and a wide range of backgrounds would build the proactive, protective military grade cyber security product with one passion in mind – protecting American businesses, large, medium or small, their employees and customers, from cyber threats on their networks.

Loading posts...
Sort Gallery
Enter your email here