summaryrefslogtreecommitdiffhomepage
path: root/website/index.md
blob: f09a7e89ed67fa50095a377320bf33bf5bd39f58 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
---
title: gVisor
layout: base
---

<div class="jumbotron jumbotron-fluid">
  <div class="container text-center">
    <p>Efficient defense-in-depth for container infrastructure anywhere.</p>
    <p style="margin-top: 20px;">
      <a class="btn" href="/docs/">Get Started&nbsp;<i class="fas fa-arrow-alt-circle-right ml-2"></i></a>
      <a class="btn btn-inverse" href="https://github.com/google/gvisor">GitHub&nbsp;<i class="fab fa-github ml-2"></i></a>
    </p>
  </div>
</div>

<div class="container"> <!-- Full page container. -->

<!--
<div class="row">
  <div class="col-md-3"></div>
  <div class="col-md-6">
    <h3>gVisor is an open-source application kernel and container runtime for
    adding defense-in-depth or sandboxing workloads safely and easily. gVisor is
    a container-native technology, designed to improve container isolation
    without sacrificing the benefits of container efficiency and
    portability.</h3>
  </div>
  <div class="col-md-3"></div>
</div>
-->

<div class="row">

  <div class="col-md-4">
    <h4 id="seamless-security">Container-native Security</h4>
    <p>By providing each container with its own application kernel instance,
    gVisor limits the attack surface of the host while still integrating
    seamlessly with popular container orchestration systems, such as Docker and
    Kubernetes. This includes support for advanced features, such as a volumes,
    terminals and sidecars, and still providing visibility into the application
    behavior through cgroups and other monitoring mechanisms.
    </p>
    <a class="button" href="/docs/architecture_guide/security/">Read More &raquo;</a>
  </div>

  <div class="col-md-4">
    <h4 id="resource-efficiency">Resource Efficiency</h4>
    <p>Containers are efficient because workloads of different shapes and sizes
    can be packed together by sharing host resources. By using host native
    abstractions such as threads and memory mappings, gVisor closely co-operates
    with the host to enable the same resource model as native containers.
    Sandboxed containers can safely and securely share host resources with each
    other and native containers on the same system.
    </p>
    <a class="button" href="/docs/architecture_guide/resources/">Read More &raquo;</a>
  </div>

  <div class="col-md-4">
    <h4 id="platform-portability">Platform Portability</h4>
    <p>Modern infrastructure spans multiple clouds and data centers, often using
    a mix of virtualized instances and traditional servers. The pluggable
    platform architecture of gVisor allows it to run anywhere, enabling security
    policies to be enforced consistently across multiple environments.
    Sandboxing requirements need not dictate where workloads can run.
    </p>
    <a class="button" href="/docs/architecture_guide/platforms/">Read More &raquo;</a>
  </div>
</div>

</div> <!-- container -->