Leadership Team


Duncan Greatwood

Most recently, Duncan was an executive at Apple, leading search-technology projects and products. Prior to Apple, Duncan was C.E.O. of Topsy, the pioneer in social media search and analytics acquired by Apple in 2013. Prior to Topsy, he was founder and C.E.O. of PostPath, the email and security company acquired by Cisco in 2008. Previously, Duncan held sales and marketing Vice President roles at Virata/Globespan/Conexant, as well as earlier engineering and marketing positions at Madge Networks.

Duncan holds a B.A. (Mathematics) and M.Sc. (Computer Science) from Oxford University and an M.B.A. from London Business School.


Susanto Irwan

Prior to Xage, Susanto held senior engineering and product development roles at Shape Security and Arxan Technologies (acquired by TA Associates). Susanto has over 16 years of experience in security, protecting desktop, mobile, web and embedded applications against tampering, fraud, and reverse engineering across industries including financial services, mobile payments, healthcare, automotive, gaming, and entertainment.

Susanto holds a Bachelor’s in Computer Science from Purdue University.


Roman Arutyunov

Prior to Xage, Roman held Vice President of Product and Engineering roles at ABB, Tropos Networks, and Mimosa Networks solving networking, security, and data analytics challenges for industrial and commercial enterprises enabling millions of IoT devices in production today. Earlier in his career, Roman developed the first generation of Content Distribution Networks (CDN) and secure proxy servers at Blue Coat Systems (Symantec).

Roman holds a Bachelor’s in Applied Mathematics with an emphasis in Computer Science from the University of California, Berkeley and an MBA from Columbia University.

Contact Us


445 Sherman Avenue, Suite 200
Palo Alto, CA 94306



White Paper

the whitepaper

The current model of enterprise security is incapable of protecting Industry 4.0 with its intermittently connected, heterogeneous devices and applications, distributed across organizations and geographies. Today’s centralized IT security paradigm needs to be replaced by cybersecurity that is distributed, flexible and adaptive.