Traditional approaches to forensics are massively cumbersome. These would include analyzing network traffic, continually instrumenting and analyzing log files and then watching for anomalous behavior ...
The price remains the same, while the difference is mostly down to the CPU. Here's a part-by-part breakdown of all the bits.