it is highly secure as the code is analyzed before executing to make sure it won't do anything macilious.
That's not highly secure. That's a challenge.
Given that Zones can have:
different login identities
different network interfaces
different hardware available to them (disks, adapters, etc.)
be configured to use resource pools thus different amounts of cpu, floating or fixed
Yes, I'd say they are much more useful than chroot.
Maternity pay? Now every Tom, Dick and Harry will get pregnant. -- Malcolm Smith