Creating isolated secure virtual machines.
Network stack virtualization engine.
In the case of hacking a virtual system and bringing its functionality out of action, it will not affect other running virtual systems. Review collected by and hosted on G2.com.
It is not possible to use multiple IP addresses for one JAIL.
Lack of differentiation of system limits between the parent and guest systems.
Difficulties with using direct access to devices. Review collected by and hosted on G2.com.


